Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1mMndyLWM0YzQteGpnN83wPg

Apache Traffic Control vulnerable to Slowloris-style Denial of Service attack

The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of Service attack. TCP connections made on the configured DNS port will remain in the ESTABLISHED state until the client explicitly closes the connection or Traffic Router is restarted. If connections remain in the ESTABLISHED state indefinitely and accumulate in number to match the size of the thread pool dedicated to processing DNS requests, the thread pool becomes exhausted. Once the thread pool is exhausted, Traffic Router is unable to service any DNS request, regardless of transport protocol.

Permalink: https://github.com/advisories/GHSA-f2wr-c4c4-xjg7
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mMndyLWM0YzQteGpnN83wPg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 years ago
Updated: 20 days ago


CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-f2wr-c4c4-xjg7, CVE-2017-7670
References: Repository: https://github.com/apache/trafficcontrol
Blast Radius: 2.3

Affected Packages

go:github.com/apache/trafficcontrol
Dependent packages: 1
Dependent repositories: 2
Downloads:
Affected Version Ranges: = 2.1.0-RC0, >= 2.0.0-RC0, < 2.0.0, >= 1.8.0, < 1.8.1
Fixed in: 2.1.0-RC1, 2.0.0, 1.8.1
All affected versions:
All unaffected versions: 1.1.3, 5.0.0, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 5.1.6, 6.0.0, 6.0.1, 6.0.2, 6.1.0, 7.0.0, 7.0.1