CVE-2021-44040 – HTTP request line fuzzing attacks
https://notcve.org/view.php?id=CVE-2021-44040
Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1. Una vulnerabilidad de comprobación de entrada inapropiada en el análisis de líneas de petición de Apache Traffic Server permite a un atacante enviar peticiones no válidas. Este problema afecta a Apache Traffic Server versiones 8.0.0 a 8.1.3 y versiones 9.0.0 a 9.1.1 • https://lists.apache.org/thread/zblwzcfs9ryhwjr89wz4osw55pxm6dx6 https://www.debian.org/security/2022/dsa-5153 • CWE-20: Improper Input Validation •
CVE-2021-43082 – heap-buffer-overflow with stats-over-http plugin
https://notcve.org/view.php?id=CVE-2021-43082
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an attacker to overwrite memory. This issue affects Apache Traffic Server 9.1.0. Una vulnerabilidad de copia del búfer sin comprobar el tamaño de la entrada ("Desbordamiento de Búfer Clásico") en el plugin stats-over-http de Apache Traffic Server permite a un atacante sobrescribir la memoria. Este problema afecta a Apache Traffic Server versión 9.1.0 • https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2021-41585 – ATS stops accepting connections on FreeBSD
https://notcve.org/view.php?id=CVE-2021-41585
Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0. Una vulnerabilidad de comprobación de entrada inapropiada en la aceptación de conexiones de socket en Apache Traffic Server permite a un atacante hacer que el servidor deje de aceptar nuevas conexiones. Este problema afecta a Apache Traffic Server versiones 5.0.0 a 9.1.0 • https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 • CWE-20: Improper Input Validation •
CVE-2021-38161 – Not validating origin TLS certificate
https://notcve.org/view.php?id=CVE-2021-38161
Improper Authentication vulnerability in TLS origin verification of Apache Traffic Server allows for man in the middle attacks. This issue affects Apache Traffic Server 8.0.0 to 8.0.8. Una vulnerabilidad de Autenticación inapropiada en la verificación de origen TLS de Apache Traffic Server permite realizar ataques de tipo man in the middle. Este problema afecta a Apache Traffic Server versiones 8.0.0 a 8.0.8 • https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 https://www.debian.org/security/2022/dsa-5153 • CWE-287: Improper Authentication •
CVE-2021-37149 – Request Smuggling - multiple attacks
https://notcve.org/view.php?id=CVE-2021-37149
Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0. Una vulnerabilidad de Comprobación de entrada inapropiada en el análisis de encabezados de Apache Traffic Server permite a un atacante colar peticiones. Este problema afecta a Apache Traffic Server versiones 8.0.0 a 8.1.2 y 9.0.0 a 9.1.0 • https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164 https://www.debian.org/security/2022/dsa-5153 • CWE-20: Improper Input Validation •