CVE-2015-3249Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Traffic Server

Severity
9.8CRITICALNVD
EPSS
4.2%
top 11.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 30
Latest updateMay 24

Description

The HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.1 allows remote attackers to cause a denial of service (out-of-bounds access and daemon crash) or possibly execute arbitrary code via vectors related to the (1) frame_handlers array or (2) set_dynamic_table_size function.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
GHSA-465p-v3ff-mc33: The HTTP/2 experimental feature in Apache Traffic Server 52022-05-24
OSV
CVE-2015-3249: The HTTP/2 experimental feature in Apache Traffic Server 52017-10-30
CVEList
CVE-2015-3249: The HTTP/2 experimental feature in Apache Traffic Server 52017-10-30

📋Vendor Advisories

1
Debian
CVE-2015-3249: trafficserver - The HTTP/2 experimental feature in Apache Traffic Server 5.3.x before 5.3.1 allo...2015

💬Community

3
Bugzilla
CVE-2015-3249 trafficserver: Out-of-bounds read due in the HTTP/2 experimental feature2017-11-21
Bugzilla
CVE-2015-3249 CVE-2017-5659 trafficserver: various flaws [fedora-all]2017-04-19
Bugzilla
CVE-2015-3249 CVE-2017-5659 trafficserver: various flaws [epel-all]2017-04-19
CVE-2015-3249 — Apache Traffic Server vulnerability | cvebase