![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.144174 |
Category: | Web Servers |
Title: | Apache Traffic Server (ATS) HTTP/2 DoS Vulnerability |
Summary: | Apache Traffic Server is prone to a denial of service vulnerability due to; certain types of HTTP/2 HEADERS frames can cause the server to allocate a large amount of memory and spin the; thread. |
Description: | Summary: Apache Traffic Server is prone to a denial of service vulnerability due to certain types of HTTP/2 HEADERS frames can cause the server to allocate a large amount of memory and spin the thread. Affected Software/OS: Apache Traffic Server versions 6.0.0 - 6.2.3, 7.0.0 - 7.1.10 and 8.0.0 - 8.0.7. Solution: Update to version 7.1.11, 8.0.8 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-9494 https://lists.apache.org/thread.html/rf7f86917f42fdaf904d99560cba0c016e03baea6244c47efeb60ecbe%40%3Cdev.trafficserver.apache.org%3E Debian Security Information: DSA-4710 (Google Search) https://www.debian.org/security/2020/dsa-4710 http://www.openwall.com/lists/oss-security/2021/03/01/2 |
Copyright | Copyright (C) 2020 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |