2021-09-24 07:00:55 +00:00
{
"CVE_data_meta" : {
2021-11-17 15:47:33 -05:00
"ASSIGNER" : "security@apache.org" ,
2021-09-24 07:00:55 +00:00
"ID" : "CVE-2021-41585" ,
2021-11-17 15:47:33 -05:00
"STATE" : "PUBLIC" ,
"TITLE" : "ATS stops accepting connections on FreeBSD"
2021-09-24 07:00:55 +00:00
} ,
2021-11-17 15:47:33 -05:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Apache Traffic Server" ,
"version" : {
"version_data" : [
{
"version_value" : "7.0.0 to 9.1.0"
}
]
}
}
]
} ,
"vendor_name" : "Apache Software Foundation"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "Apache Traffic Server would like to thank Asbjorn Bjornstad for finding this issue."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-09-24 07:00:55 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-11-17 15:47:33 -05:00
"value" : "Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0."
2021-09-24 07:00:55 +00:00
}
]
2021-11-17 15:47:33 -05:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : [
{ }
] ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "cwe"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"url" : "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164" ,
"name" : "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164"
}
]
} ,
"source" : {
"discovery" : "UNKNOWN"
2021-09-24 07:00:55 +00:00
}
2021-11-03 16:01:04 +00:00
}