Vulnerability Description
Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 to 9.1.1.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Traffic Server | >= 8.0.0, <= 8.1.3 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/zblwzcfs9ryhwjr89wz4osw55pxm6dx6Mailing ListVendor Advisory
- https://www.debian.org/security/2022/dsa-5153Third Party Advisory
- https://lists.apache.org/thread/zblwzcfs9ryhwjr89wz4osw55pxm6dx6Mailing ListVendor Advisory
- https://www.debian.org/security/2022/dsa-5153Third Party Advisory
FAQ
What is CVE-2021-44040?
CVE-2021-44040 is a vulnerability with a CVSS score of 7.5 (HIGH). Improper Input Validation vulnerability in request line parsing of Apache Traffic Server allows an attacker to send invalid requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.3 and 9.0.0 ...
How severe is CVE-2021-44040?
CVE-2021-44040 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-44040?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Traffic Server, Debian Debian Linux.