CVE-2014-3624 (retired)

Priority
Description
Apache Traffic Server 5.1.x before 5.1.1 allows remote attackers to bypass
access restrictions by leveraging failure to properly tunnel remap requests
using CONNECT.
Package
Upstream:released (5.1.1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (5.1.1-1)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (5.1.1-1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (5.1.1-1)
Ubuntu 19.04 (Disco Dingo):not-affected (5.1.1-1)
Ubuntu 19.10 (Eoan):not-affected (5.1.1-1)
Patches:
Upstream:https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=33a4771
More Information

Updated: 2019-05-22 14:14:55 UTC (commit 1fab1041f9489915eb36ac3c2f1c6f9650ad31e6)