Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.10, and 8.0.0 to 8.0.7 is vulnerable to certain types of HTTP/2 HEADERS frames that can cause the server to allocate a large amount of memory and spin the thread.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2021/03/01/2 | Not Applicable | 
| https://lists.apache.org/thread.html/rf7f86917f42fdaf904d99560cba0c016e03baea6244c47efeb60ecbe%40%3Cdev.trafficserver.apache.org%3E | Mailing List Vendor Advisory | 
| https://www.debian.org/security/2020/dsa-4710 | Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2021/03/01/2 | Not Applicable | 
| https://lists.apache.org/thread.html/rf7f86917f42fdaf904d99560cba0c016e03baea6244c47efeb60ecbe%40%3Cdev.trafficserver.apache.org%3E | Mailing List Vendor Advisory | 
| https://www.debian.org/security/2020/dsa-4710 | Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-06-24 16:15
Updated : 2024-11-21 05:40
NVD link : CVE-2020-9494
Mitre link : CVE-2020-9494
CVE.ORG link : CVE-2020-9494
JSON object : View
Products Affected
                apache
- traffic_server
debian
- debian_linux
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
