cvelist/2021/41xxx/CVE-2021-41585.json
Anthony Singleton 938debeed0 Revert "November 2021 Patch Tuesday"
This reverts commit df296d9e014bf68ef22c0583c98da3fbe42ea316.
2021-11-17 15:47:33 -05:00

78 lines
2.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2021-41585",
"STATE": "PUBLIC",
"TITLE": "ATS stops accepting connections on FreeBSD"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Traffic Server",
"version": {
"version_data": [
{
"version_value": "7.0.0 to 9.1.0"
}
]
}
}
]
},
"vendor_name": "Apache Software Foundation"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Apache Traffic Server would like to thank Asbjorn Bjornstad for finding this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": [
{}
],
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "cwe"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164",
"name": "https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164"
}
]
},
"source": {
"discovery": "UNKNOWN"
}
}