NA

CVE-2023-39456

Published: 17/10/2023 Updated: 06/11/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Improper Input Validation vulnerability in Apache Traffic Server with malformed HTTP/2 frames.This issue affects Apache Traffic Server: from 9.0.0 up to and including 9.2.2. Users are recommended to upgrade to version 9.2.3, which fixes the issue.

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

fedoraproject fedora 37

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1054427 trafficserver: CVE-2023-41752 CVE-2023-39456 CVE-2023-44487 Package: src:trafficserver; Maintainer for src:trafficserver is Jean Baptiste Favre <debian@jbfavreorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Mon, 23 Oct 2023 18:21:04 UTC Severity: grave Tags: security, u ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in denial of service or information disclosure For the oldstable distribution (bullseye), these problems have been fixed in version 819+ds-1~deb11u1 For the stable distribution (bookworm), these problems have been fixed in ve ...