CVE-2024-31309

HIGH

Apache Traffic Server < 8.1.10 - Improper Input Validation

Title source: rule

Description

HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources on the server.  Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 are affected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute.  ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.

Exploits (1)

github WORKING POC 15 stars
by lockness-Ko · gopoc
https://github.com/lockness-Ko/CVE-2024-27316

Scores

CVSS v3 7.5
EPSS 0.1085
EPSS Percentile 93.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-20
Status published
Products (5)
apache/traffic_server 8.0.0 - 8.1.10
debian/debian_linux 10.0
fedoraproject/fedora 38
fedoraproject/fedora 39
fedoraproject/fedora 40
Published Apr 10, 2024
Tracked Since Feb 18, 2026