Denial of Service (DoS) Affecting traffic_server package, versions [6.0.0,6.2.3][7.0.0,7.1.7)[8.0.0,8.0.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
20.59% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-TRAFFICSERVER-2382190
  • published12 Jan 2022
  • disclosed13 Aug 2019
  • creditUnknown

Introduced: 13 Aug 2019

CVE-2019-9513  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade traffic_server to version 7.1.7, 8.0.4 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.

References

CVSS Scores

version 3.1