CVE-2019-10079Allocation of Resources Without Limits or Throttling in Apache Traffic Server

Severity
7.5HIGHNVD
EPSS
5.1%
top 10.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22
Latest updateMay 24

Description

Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDapache/traffic_server8.0.08.0.4+1
CVEListV5apache_software_foundation/apache_traffic_serverApache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.6, and 8.0.0 to 8.0.3

🔴Vulnerability Details

3
GHSA
GHSA-gf9c-jvmp-j8cg: Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks2022-05-24
CVEList
CVE-2019-10079: Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks2019-10-22
OSV
CVE-2019-10079: Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks2019-10-22

📋Vendor Advisories

1
Debian
CVE-2019-10079: trafficserver - Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier ver...2019
CVE-2019-10079 — Apache Traffic Server vulnerability | cvebase