Lucene search

K
nvd[email protected]NVD:CVE-2019-15892
HistorySep 03, 2019 - 9:15 p.m.

CVE-2019-15892

2019-09-0321:15:10
CWE-617
web.nvd.nist.gov
5

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.042

Percentile

92.4%

An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

Affected configurations

Nvd
Node
varnish-softwarevarnish_cacheRange6.0.06.0.4lts
OR
varnish_cache_projectvarnish_cacheRange6.1.06.1.1
OR
varnish_cache_projectvarnish_cacheRange6.2.06.2.1
Node
debiandebian_linuxMatch10.0
VendorProductVersionCPE
varnish-softwarevarnish_cache*cpe:2.3:a:varnish-software:varnish_cache:*:*:*:*:lts:*:*:*
varnish_cache_projectvarnish_cache*cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*
debiandebian_linux10.0cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.042

Percentile

92.4%