7.5
CVSSv3

CVE-2019-15892

Published: 03/09/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

An issue exists in Varnish Cache prior to 6.0.4 LTS, and 6.1.x and 6.2.x prior to 6.2.1. An HTTP/1 parsing failure allows a remote malicious user to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

varnish cache project varnish cache

varnish-software varnish cache

debian debian linux 10.0

Vendor Advisories

Synopsis Moderate: varnish:6 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for the varnish:6 module is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabi ...
Alf-Andre Walla discovered a remotely triggerable assert in the Varnish web accelerator; sending a malformed HTTP request could result in denial of service The oldstable distribution (stretch) is not affected For the stable distribution (buster), this problem has been fixed in version 611-1+deb10u1 We recommend that you upgrade your varnish pa ...