First published: Wed Nov 03 2021(Updated: )
Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=8.0.0<=8.1.2 | |
Apache Traffic Server | >=9.0.0<=9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41585 is an Improper Input Validation vulnerability in Apache Traffic Server that allows an attacker to make the server stop accepting new connections.
CVE-2021-41585 affects Apache Traffic Server versions 5.0.0 to 9.1.0.
CVE-2021-41585 has a severity rating of 7.5 (High).
To fix CVE-2021-41585, users should upgrade to a version of Apache Traffic Server that is not affected by the vulnerability.
More information about CVE-2021-41585 can be found at https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164.