CVE-2014-3624

Published: 30 October 2017

Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass access restrictions by leveraging failure to properly tunnel remap requests using CONNECT.

Priority

Medium

CVSS 3 base score: 9.8

Status

Package Release Status
trafficserver
Launchpad, Ubuntu, Debian
Upstream
Released (5.1.1-1)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(5.1.1-1)
Ubuntu 16.04 LTS (Xenial Xerus) Not vulnerable
(5.1.1-1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was needed)
Patches:
Upstream: https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=33a4771