First published: Wed Mar 23 2022(Updated: )
Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=8.0.0<=8.1.3 | |
Apache Traffic Server | >=9.0.0<=9.1.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44040 is an Improper Input Validation vulnerability in request line parsing of Apache Traffic Server.
CVE-2021-44040 allows an attacker to send invalid requests to Apache Traffic Server.
CVE-2021-44040 affects Apache Traffic Server versions 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1.
CVE-2021-44040 has a severity rating of 7.5 (high).
To fix CVE-2021-44040, update to the recommended versions of Apache Traffic Server provided by Debian.