Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-15892

Опубликовано: 03 сент. 2019
Источник: redhat
CVSS3: 7.5

Описание

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

A flaw was found in the way Varnish parsed certain HTTP/1 requests. A remote attacker could use this flaw to crash Varnish by sending specially crafted multiple HTTP/1 requests processed on the same HTTP/1 keep-alive connection. This causes Varnish to restart with a clean cache, causing a denial of service.

Отчет

This is a remote denial of service flaw in varnish cache application. It causes varnish to restart, with a clean cache, since the purpose of varnish is to cache web pages thereby improving overall web server performance, an attacker can cause web performance to degrade due to this attack.

Меры по смягчению последствий

This flaw can be mitigated by using making changes in varnish configuration by using VCL (Varnish Configuration Language). More details available at: https://varnish-cache.org/security/VSV00003-mitigation.html#vsv00003-mitigation

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Software Collectionsrh-varnish5-varnishNot affected
Red Hat Enterprise Linux 8varnishFixedRHSA-2020:475604.11.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-varnish6FixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-varnish6-varnishFixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-varnish6-varnish-modulesFixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-varnish6FixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-varnish6-varnishFixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSrh-varnish6-varnish-modulesFixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-varnish6FixedRHEA-2020:226226.05.2020
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-varnish6-varnishFixedRHEA-2020:226226.05.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1756079varnish: denial of service handling certain crafted HTTP/1 requests

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

CVSS3: 7.5
nvd
больше 6 лет назад

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

CVSS3: 7.5
debian
больше 6 лет назад

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x a ...

suse-cvrf
около 6 лет назад

Security update for varnish

CVSS3: 7.5
github
больше 3 лет назад

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

7.5 High

CVSS3