Description:
ATS is vulnerable to various HTTP/2 attacks
CVE:
CVE-2019-9512 Ping Flood
CVE-2019-9514 Reset Flood
CVE-2019-9515 Settings Flood
CVE-2019-10079 ATS is vulnerable to malformed SETTINGS frames
Reported By:
Jonathan Looney (CVE-2019-9512, CVE-2019-9514, CVE-2019-9515)
Masakazu Kitajo (CVE-2019-10079)
Vendor:
The Apache Software Foundation
Version Affected:
ATS 6.0.0 to 6.2.3
ATS 7.0.0 to 7.1.6
ATS 8.0.0 to 8.0.3
Mitigation:
Turn off HTTP/2 or upgrade ATS to a current version
6.x users should upgrade to 7.1.7, 8.0.4, or later versions
7.x users should upgrade to 7.1.7 or later versions
8.x users should upgrade to 8.0.4 or later versions
References:
Downloads:
https://trafficserver.apache.org/downloads
(Please use backup sites from the link only if the mirrors are
unavailable)
Github Pull Request:
https://github.com/apache/trafficserver/pull/5820
https://github.com/apache/trafficserver/pull/5821
https://github.com/apache/trafficserver/pull/5822
https://github.com/apache/trafficserver/pull/5528
CVE:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10079
-Bryan