445
VMScore

CVE-2015-8852

Published: 25/04/2016 Updated: 02/08/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Varnish 3.x prior to 3.0.7, when used in certain stacked installations, allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

varnish cache project varnish cache 3.0.0

varnish cache project varnish cache 3.0.6

varnish cache project varnish cache 3.0.5

varnish cache project varnish cache 3.0.2

varnish cache project varnish cache 3.0.4

varnish cache project varnish cache 3.0.3

varnish cache project varnish cache 3.0.1

debian debian linux 7.0

Vendor Advisories

Régis Leroy from Makina Corpus discovered that varnish, a caching HTTP reverse proxy, is vulnerable to HTTP smuggling issues, potentially resulting in cache poisoning or bypassing of access control policies For the oldstable distribution (wheezy), this problem has been fixed in version 302-2+deb7u2 We recommend that you upgrade your varnish pa ...
Debian Bug report logs - #783510 varnish: CVE-2015-8852: HTTP Smuggling issues: Double Content Length and bad EOL Package: varnish; Maintainer for varnish is Varnish Package Maintainers <team+varnish-team@trackerdebianorg>; Source for varnish is src:varnish (PTS, buildd, popcon) Reported by: Régis Leroy <regisleroy@ma ...
Debian Bug report logs - #808293 Regression in short UDP reads caused by "net: Fix skb csum races when peeking" Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Affects: freeradius Reported by: Francesco Politi <fpoliti@micsoit> Date: Fri, 18 Dec 2015 12:09:01 UTC ...
Varnish 3x before 307, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request (CVE-2015-8852) ...
Varnish 3x before 307, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request ...