Executive Summary

Summary
Titlevarnish security update
Informations
NameDSA-4514First vendor Publication2019-09-04
VendorDebianLast vendor Modification2019-09-04
Severity (Vendor) N/ARevision1

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score7.8Attack RangeNetwork
Cvss Impact Score6.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Alf-Andre Walla discovered a remotely triggerable assert in the Varnish web accelerator; sending a malformed HTTP request could result in denial of service.

The oldstable distribution (stretch) is not affected.

For the stable distribution (buster), this problem has been fixed in version 6.1.1-1+deb10u1.

We recommend that you upgrade your varnish packages.

For the detailed security status of varnish please refer to its security tracker page at: https://security-tracker.debian.org/tracker/varnish

Original Source

Url : http://www.debian.org/security/2019/dsa-4514

CWE : Common Weakness Enumeration

%idName
100 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application6
Os1

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-09-05 21:22:31
  • Multiple Updates
2019-09-04 09:18:36
  • First insertion