Page 2 of 6 results (0.004 seconds)

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 0

Apache Traffic Server 2.0.x and 3.0.x before 3.0.4 and 3.1.x before 3.1.3 does not properly allocate heap memory, which allows remote attackers to cause a denial of service (daemon crash) via a long HTTP Host header. Apache Traffic Server v2.0.x y v3.0.x anteriores a v3.0.4 y v3.1.x anteriores a v3.1.3 no posiciona de forma adecuada la memoria dinámica, lo que permite a atacantes remotos provocar una denegación del servicio (caída del demonio) a través de una cabecera larga HTTP Host. • http://archives.neohapsis.com/archives/bugtraq/2012-03/0118.html http://seclists.org/fulldisclosure/2012/Mar/260 http://trafficserver.apache.org/downloads http://www.securityfocus.com/bid/52696 http://www.securitytracker.com/id?1026847 https://www.cert.fi/en/reports/2012/vulnerability612884.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •