Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Feb 2018 10:31:15 -0800
From: Bryan Call <bcall@...che.org>
To: dev <dev@...fficserver.apache.org>,
 users <users@...fficserver.apache.org>,
 announce@...fficserver.apache.org,
 security@...fficserver.apache.org,
 oss-security@...ts.openwall.com
Subject: [ANNOUNCE] Apache Traffic Server vulnerability with TLS handshake -
 CVE-2017-7671

CVE-2017-7671: Apache Traffic Server vulnerability with TLS handshake

Vendor:
The Apache Software Foundation

Version Affected:
ATS 5.2.0 to 5.3.2
ATS 6.0.0 to 6.2.0
ATS 7.0.0

Description:
There is a DOS attack vulnerability in ATS with the TLS handshake.  This issue can cause the server to coredump.

Mitigation:
5.x users should upgrade to 7.1.2 or later versions
6.x users should upgrade to 6.2.2 or later versions
7.x users should upgrade to 7.1.2 or later versions

References:
	Downloads:
		https://trafficserver.apache.org/downloads
	Github Pull Request:
		https://github.com/apache/trafficserver/pull/1941
	CVE:
		https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7671

-Bryan



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ