Impact
A bug in Apache Traffic Server’s handling of POST requests can cause the server to terminate when receiving a legitimate request, resulting in an availability outage. The flaw involves improper release of a reference counted resource and is identified as CWE‑670. The crash occurs under a specific internal condition triggered by a normal HTTP POST operation.
Affected Systems
Apache Traffic Server versions 10.0.0 through 10.1.1 and 9.0.0 through 9.2.12 are vulnerable. The issue is resolved in 10.1.2 and 9.2.13. For older releases the recommended mitigation is to set proxy.config.http.request_buffer_enabled to 0, the default value, to prevent the crash.
Risk and Exploitability
The CVSS score of 7.5 reflects a high severity. The EPSS score of less than 1% indicates the likelihood of exploitation is currently low and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote network access capable of sending a POST request; this inference is derived from the description stating that a legitimate POST request can trigger the crash.
OpenCVE Enrichment
Debian DSA