Lucene search

K
redhatcveRedhat.comRH:CVE-2022-38150
HistoryAug 11, 2022 - 4:07 p.m.

CVE-2022-38150

2022-08-1116:07:22
redhat.com
access.redhat.com
21
varnish
denial of service
http response

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

51.7%

A flaw was found in Varnish where a denial of service attack can be performed against Varnish Cache servers by specially formatting the reason phrase of the backend response status line. To execute an attack, the attacker needs the ability to influence the HTTP/1 responses that the Varnish Server receives from its configured backends, causing the Varnish Server to assert and automatically restart.

Mitigation

As mentioned in the upstream security advisory, If upgrading Varnish is not possible, it is possible to mitigate the problem by adding the following snippet at the beginning of the vcl_backend_response VCL function:

sub vcl_backend_response {  
      set beresp.status = beresp.status;  
}  

By setting the status code to itself as described above, the reason field will automatically be reset to the standard value for the given status code, or β€œUnknown HTTP Status” if no standard value exists for that code. This would overwrite any existing attack content in the reason field.

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

51.7%