Lucene search

K
cve[email protected]CVE-2017-12425
HistoryAug 04, 2017 - 9:29 a.m.

CVE-2017-12425

2017-08-0409:29:00
CWE-190
web.nvd.nist.gov
110
3
varnish
http cache
cve-2017-12425
denial-of-service
integer overflow

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.6%

An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack. The specific source-code filename containing the incorrect statement varies across releases.

Affected configurations

NVD
Node
varnish-cachevarnishMatch4.0.2rc-1
OR
varnish-cachevarnishMatch4.0.3rc-1
OR
varnish-cachevarnishMatch4.0.3rc-2
OR
varnish-cachevarnishMatch4.0.3rc-2-proper
OR
varnish-cachevarnishMatch4.0.3rc-3
OR
varnish_cache_projectvarnish_cacheMatch4.0.1
OR
varnish_cache_projectvarnish_cacheMatch4.0.2
OR
varnish_cache_projectvarnish_cacheMatch4.0.3
OR
varnish_cache_projectvarnish_cacheMatch4.0.4
Node
varnish-cachevarnishMatch4.1.0
OR
varnish-softwarevarnish_cacheMatch4.1.0beta1
OR
varnish-softwarevarnish_cacheMatch4.1.0technology_preview1
OR
varnish-softwarevarnish_cacheMatch4.1.1
OR
varnish-softwarevarnish_cacheMatch4.1.1beta1
OR
varnish-softwarevarnish_cacheMatch4.1.1beta2
OR
varnish-softwarevarnish_cacheMatch4.1.2
OR
varnish-softwarevarnish_cacheMatch4.1.2beta1
OR
varnish-softwarevarnish_cacheMatch4.1.2beta2
OR
varnish-softwarevarnish_cacheMatch4.1.3
OR
varnish-softwarevarnish_cacheMatch4.1.3beta1
OR
varnish-softwarevarnish_cacheMatch4.1.3beta2
OR
varnish-softwarevarnish_cacheMatch4.1.4
OR
varnish-softwarevarnish_cacheMatch4.1.4beta1
OR
varnish-softwarevarnish_cacheMatch4.1.4beta2
OR
varnish-softwarevarnish_cacheMatch4.1.4beta3
OR
varnish-softwarevarnish_cacheMatch4.1.5
OR
varnish-softwarevarnish_cacheMatch4.1.5beta1
OR
varnish-softwarevarnish_cacheMatch4.1.5beta2
OR
varnish-softwarevarnish_cacheMatch4.1.6
OR
varnish-softwarevarnish_cacheMatch4.1.7
Node
varnish_cache_projectvarnish_cacheMatch5.0.0
OR
varnish_cache_projectvarnish_cacheMatch5.1.0
OR
varnish_cache_projectvarnish_cacheMatch5.1.1
OR
varnish_cache_projectvarnish_cacheMatch5.1.2

Social References

More

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.2 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.6%