

Rewterz Threat Advisory – Multiple Fortinet Vulnerabilities
November 4, 2021
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
November 4, 2021
Rewterz Threat Advisory – Multiple Fortinet Vulnerabilities
November 4, 2021
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
November 4, 2021Severity
Medium
Analysis Summary
CVE-2021-43082
Apache Traffic Server is vulnerable to a buffer overflow, caused by improper bounds checking by the stats-over-http plugin. By sending a specially-crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVE-2021-41585
Apache Traffic Server is vulnerable to a denial of service, caused by an improper input validation flaw when accepting socket connections. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to make the server stop accepting new connections, and results in a denial of service condition.
CVE-2021-38161
Apache Traffic Server is vulnerable to a man-in-the-middle attack, caused by an improper authentication flaw in the TLS origin verification. An attacker could exploit this vulnerability to launch a man-in-the-middle attack and gain access to the communication channel between endpoints to obtain sensitive information or further compromise the system.
CVE-2021-37149
Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVE-2021-37148
Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVE-2021-37147
Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
Impact
- Buffer Overflow
- Denial of Service
- Unauthorized Access
Affected Vendors
Apache
Affected Products
- Apache Traffic Server 9.1.0
- Apache Traffic Server 5.0.0
- Apache Traffic Server 8.0.0
- Apache Traffic Server 8.0.8
- Apache Traffic Server 9.0.0
- Apache Traffic Server 8.1.2
Remediation
Upgrade to the latest version of Apache Traffic Server, available from the Apache Web site.