Description
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
Published: 2019-10-22
Score: 7.5 High
EPSS: 5.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-2134 Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
History

No history.

Subscriptions

Apache Traffic Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T22:10:09.532Z

Reserved: 2019-03-26T00:00:00.000Z

Link: CVE-2019-10079

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-10-22T16:15:10.610

Modified: 2024-11-21T04:18:21.293

Link: CVE-2019-10079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses