Files
CVEs-PoC/2017/CVE-2017-7671.md
T
2025-09-29 21:09:30 +02:00

20 lines
877 B
Markdown

### [CVE-2017-7671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7671)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Traffic%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0%20to%205.3.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20to%206.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brightgreen)
### Description
There is a DOS attack vulnerability in Apache Traffic Server (ATS) 5.2.0 to 5.3.2, 6.0.0 to 6.2.0, and 7.0.0 with the TLS handshake. This issue can cause the server to coredump.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Farrhouq/Inpt-report