First published: Wed Nov 03 2021(Updated: )
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=8.0.0<=8.1.2 | |
Apache Traffic Server | >=9.0.0<=9.1.0 | |
>=8.0.0<=8.1.2 | ||
>=9.0.0<=9.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-43082.
The title of this vulnerability is 'Buffer Copy without Checking Size of Input (Classic Buffer Overflow) vulnerability in the stats-over-http plugin of Apache Traffic Server'.
The severity of CVE-2021-43082 is critical with a CVSS score of 9.8.
This vulnerability affects Apache Traffic Server versions 8.0.0 to 8.1.2 and version 9.0.0 to 9.1.0.
An attacker can exploit this vulnerability by overwriting memory through the stats-over-http plugin of Apache Traffic Server.