7.5
CVSSv3

CVE-2021-28543

Published: 16/03/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Varnish varnish-modules prior to 0.17.1 allows remote malicious users to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

varnish-cache varnish-modules

varnish-cache varnish-modules klarlack

fedoraproject fedora 34

Vendor Advisories

Debian Bug report logs - #985947 CVE-2021-28543 Package: varnish-modules; Maintainer for varnish-modules is Varnish Package Maintainers <team+varnish-team@trackerdebianorg>; Source for varnish-modules is src:varnish-modules (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 26 Mar 202 ...
No description is available for this CVE ...