Apache Traffic Server < 3.0.4 / 3.1.3 Buffer Overflow Vulnerability

High Nessus Network Monitor Plugin ID 6401

Synopsis

The remote caching server is affected by a heap-based buffer overflow vulnerability.

Description

Apache Traffic Server, an open source caching server, is installed on the remote host.

Versions of Apache Traffic Server earlier than 3.0.4 or 3.1.x earlier than 3.1.3 are potentially affected by a heap-based buffer overflow vulnerability when handling malicious HTTP host headers. By exploiting this flaw, a remote, unauthenticated attacker could execute arbitrary code on the remote host subject to the privileges of the user running the affected service.

Solution

Upgrade to Apache Traffic Server 3.0.4, 3.1.3, or later.

See Also

http://seclists.org/fulldisclosure/2012/Mar/260

https://www.cert.fi/en/reports/2012/vulnerability612884.html

Plugin Details

Severity: High

ID: 6401

File Name: 6401.prm

Family: Web Servers

Published: 2012/03/29

Modified: 2016/01/15

Dependencies: 3057

Nessus ID: 58593

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Patch Publication Date: 2012/03/22

Vulnerability Publication Date: 2012/03/22

Reference Information

CVE: CVE-2012-0256

BID: 52696