Vulnerability Description
Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic Server 5.0.0 to 9.1.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Traffic Server | >= 8.0.0, <= 8.1.2 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164Mailing ListPatchVendor Advisory
- https://lists.apache.org/thread/k01797hyncx53659wr3o72s5cvkc3164Mailing ListPatchVendor Advisory
FAQ
What is CVE-2021-41585?
CVE-2021-41585 is a vulnerability with a CVSS score of 7.5 (HIGH). Improper Input Validation vulnerability in accepting socket connections in Apache Traffic Server allows an attacker to make the server stop accepting new connections. This issue affects Apache Traffic...
How severe is CVE-2021-41585?
CVE-2021-41585 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41585?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Traffic Server.