cvelist/2021/41xxx/CVE-2021-41585.json

78 lines
2.3 KiB
JSON
Raw Normal View History

2021-09-24 07:00:55 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
2021-09-24 07:00:55 +00:00
"ID": "CVE-2021-41585",
"STATE": "PUBLIC",
"TITLE": "ATS stops accepting connections on FreeBSD"
2021-09-24 07:00:55 +00:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Traffic Server",
"version": {
"version_data": [
{
"version_value": "7.0.0 to 9.1.0"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Traffic Server would like to thank Asbjorn Bjornstad for finding this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-09-24 07:00:55 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0."
2021-09-24 07:00:55 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "cwe"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164",
"name": "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164"
}
]
},
"source": {
"discovery": "UNKNOWN"
2021-09-24 07:00:55 +00:00
}
2021-11-03 16:01:04 +00:00
}