Lucene search

K
cve[email protected]CVE-2022-38150
HistoryAug 11, 2022 - 1:15 a.m.

CVE-2022-38150

2022-08-1101:15:10
web.nvd.nist.gov
78
8
varnish cache
http/1
vulnerability
server assert
restart
cve-2022-38150

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

51.7%

In Varnish Cache 7.0.0, 7.0.1, 7.0.2, and 7.1.0, it is possible to cause the Varnish Server to assert and automatically restart through forged HTTP/1 backend responses. An attack uses a crafted reason phrase of the backend response status line. This is fixed in 7.0.3 and 7.1.1.

Affected configurations

NVD
Node
varnish_cache_projectvarnish_cacheMatch7.0.0
OR
varnish_cache_projectvarnish_cacheMatch7.0.1
OR
varnish_cache_projectvarnish_cacheMatch7.0.2
OR
varnish_cache_projectvarnish_cacheMatch7.1.0
Node
fedoraprojectfedoraMatch35
OR
fedoraprojectfedoraMatch36

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

51.7%