9.8
CVSSv3

CVE-2021-43082

Published: 03/11/2021 Updated: 05/11/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in the stats-over-http plugin of Apache Traffic Server allows an malicious user to overwrite memory. This issue affects Apache Traffic Server 9.1.0.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

Mailing Lists

Description: Apache Traffic Server is vulnerable to various smuggle, DOS, and validation attacks CVE (81x and 91x): CVE-2021-37147 Request Smuggling - LF line ending CVE-2021-37148 Request Smuggling - transfer encoding validation CVE-2021-37149 Request Smuggling - multiple attacks CVE-2021-41585 ATS stops accepting connections on FreeBSD CVE-2 ...