4
CVSSv2

CVE-2018-8004

Published: 29/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

debian debian linux 9.0

Vendor Advisories

Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service, cache poisoning or information disclosure For the stable distribution (stretch), these problems have been fixed in version 700-6+deb9u2 We recommend that you upgrade your trafficserver packages For the ...