Apache Traffic Server 5.1.x < 5.1.2 DoS

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote caching server is affected by a denial of service
vulnerability.

Description :

According to its banner, the version of Apache Traffic Server running
on the remote host is 5.1.x prior to 5.1.2. It is, therefore, affected
by a denial of service vulnerability caused by an flaw in the
'HttpTransact.cc' file related to an error in internal buffer sizing.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://www.nessus.org/u?c7cd8218
http://www.nessus.org/u?79fdc167

Solution :

Upgrade to Apache Traffic Server 5.1.2 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 80919 ()

Bugtraq ID: 71879

CVE ID: CVE-2014-10022

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now