1.0 Introduction
Recently, Apache has released security updates to address three critical vulnerabilities in Apache Traffic Server.
2.0 Impact
These vulnerabilities could potentially expose users to various cyber threats including cache poisoning, application crashes and potential privilege escalation.
3.0 Affected Products
- Apache Traffic Server versions 9.0.0 to 9.2.5
- Apache Traffic Server versions 10.0.0 to 10.0.1
4.0 Recommendations
CyberSecurity Malaysia urges users and organisations to review the
Apache Security Bulletin
, follow the Mitigation steps and apply the necessary updates.
Kindly refer to the URL for more information: https://lists.apache.org/thread/jr0kk5xs2dzmb12203bbots7rpmtz50y
Generally, Cyber999 advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17.30 MYT
Web:
https://www.mycert.org.my
5.0 References
- https://lists.apache.org/thread/jr0kk5xs2dzmb12203bbots7rpmtz50y
- https://securityonline.info/apache-traffic-server-patches-critical-vulnerabilities-in-latest-release/
- https://httpd.apache.org/download.cgi
- https://www.cve.org/CVERecord?id=CVE-2024-38479
- https://www.cve.org/CVERecord?id=CVE-2024-50305
- https://www.cve.org/CVERecord?id=CVE-2024-50306