Impact
The vulnerability is a bug in Apache Traffic Server’s handling of POST requests that triggers a crash under a specific condition. The crash leads to a denial of service, allowing an attacker to cause service interruption. The weakness is a denial of service caused by a buffer-related flaw (CWE‑670).
Affected Systems
Apache Traffic Server by the Apache Software Foundation is affected. Versions from 9.0.0 through 9.2.12 and from 10.0.0 through 10.1.1 are vulnerable. The vulnerability exists only in these ranges and is fixed in 9.2.13 and 10.1.2.
Risk and Exploitability
The CVSS score of 7.5 denotes a high severity. The EPSS score is not available, and the vulnerability is not listed in the KEV catalog, suggesting it is not a known exploited vulnerability. The likely attack vector is remote, through an HTTP POST request, which comes from the server’s public interfaces. Exploitation requires sending the crafted POST request to the server; no additional privileges or physical access are needed. Because the problem results in a crash, the impact is a denial of service that can affect availability.
OpenCVE Enrichment