UBUNTU-CVE-2017-7671

Source
https://ubuntu.com/security/CVE-2017-7671
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-7671.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-7671
Upstream
Published
2018-02-27T20:29:00Z
Modified
2025-07-16T07:37:12.527091Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

There is a DOS attack vulnerability in Apache Traffic Server (ATS) 5.2.0 to 5.3.2, 6.0.0 to 6.2.0, and 7.0.0 with the TLS handshake. This issue can cause the server to coredump.

References

Affected packages

Ubuntu:Pro:16.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver@5.3.0-2ubuntu2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-2ubuntu1
5.3.0-2ubuntu2

Ubuntu:18.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver@7.1.2+ds-2build1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.1.2+ds-2build1

Affected versions

7.*

7.0.0-5
7.1.2+ds-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "trafficserver",
            "binary_version": "7.1.2+ds-2build1"
        },
        {
            "binary_name": "trafficserver-dbgsym",
            "binary_version": "7.1.2+ds-2build1"
        },
        {
            "binary_name": "trafficserver-dev",
            "binary_version": "7.1.2+ds-2build1"
        },
        {
            "binary_name": "trafficserver-experimental-plugins",
            "binary_version": "7.1.2+ds-2build1"
        },
        {
            "binary_name": "trafficserver-experimental-plugins-dbgsym",
            "binary_version": "7.1.2+ds-2build1"
        }
    ]
}