CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
60.7%
An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x
before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between
the handling of one client request and the next request within the same
connection. This sometimes causes information to be disclosed from the
connection workspace, such as data structures associated with previous
requests within this connection or VCL-related temporary headers.
varnish-cache.org/security/VSV00004.html#vsv00004
github.com/varnishcache/varnish-cache/commit/bd7b3d6d47ccbb5e1747126f8e2a297f38e56b8c
launchpad.net/bugs/cve/CVE-2019-20637
nvd.nist.gov/vuln/detail/CVE-2019-20637
security-tracker.debian.org/tracker/CVE-2019-20637
ubuntu.com/security/notices/USN-5474-1
www.cve.org/CVERecord?id=CVE-2019-20637
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
60.7%