Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN715
_____________________________________________________________________

DATE                : 17/10/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Apache Traffic Control.

=====================================================================
https://lists.apache.org/thread/36s2xq8g5tjkb229znmsw534jf7pt98w
_____________________________________________________________________

CVE-2025-61581: Apache Traffic Control: ReDoS issue in Traffic Router
configuration

Severity: low 

Affected versions:

- Apache Traffic Control: all versions


Description:

** UNSUPPORTED WHEN ASSIGNED ** Inefficient Regular Expression
Complexity vulnerability in Apache Traffic Control.

This issue affects Apache Traffic Control: all versions.

People with access to the management interface of the Traffic Router
component could specify malicious patterns and cause unavailability.

As this project is retired, we do not plan to release a version that
fixes this issue. Users are recommended to find an alternative or
restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer
supported by the maintainer.


Credit:

Chris Lemmons (finder)


References:

https://trafficcontrol.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-61581


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




