Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2018-8005
PUBLISHED
More InfoOfficial Page
Assigner-apache
Assigner Org ID-f0158376-9dc2-43b6-827c-5f631a4d8d09
View Known Exploited Vulnerability (KEV) details
Published At-29 Aug, 2018 | 13:00
Updated At-16 Sep, 2024 | 19:10
Rejected At-
▼CVE Numbering Authority (CNA)

When there are multiple ranges in a range request, Apache Traffic Server (ATS) will read the entire object from cache. This can cause performance problems with large objects in cache. This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x users should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.

Affected Products
Vendor
The Apache Software FoundationApache Software Foundation
Product
Apache Traffic Server
Versions
Affected
  • 6.0.0 to 6.2.2
  • 7.0.0 to 7.1.3
Problem Types
TypeCWE IDDescription
textN/AInformation Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.apache.org/thread.html/55d225af92887bfed0194400fd1b718622cca4140fc7318d982e25ca%40%3Cusers.trafficserver.apache.org%3E
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4282
vendor-advisory
x_refsource_DEBIAN
http://www.securityfocus.com/bid/105187
vdb-entry
x_refsource_BID
https://github.com/apache/trafficserver/pull/3106
x_refsource_CONFIRM
https://github.com/apache/trafficserver/pull/3124
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.apache.org/thread.html/55d225af92887bfed0194400fd1b718622cca4140fc7318d982e25ca%40%3Cusers.trafficserver.apache.org%3E
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4282
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://www.securityfocus.com/bid/105187
vdb-entry
x_refsource_BID
x_transferred
https://github.com/apache/trafficserver/pull/3106
x_refsource_CONFIRM
x_transferred
https://github.com/apache/trafficserver/pull/3124
x_refsource_CONFIRM
x_transferred
Details not found