CVE-2015-8852

Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
varnish_cache_projectvarnish_cache
3.0.0:beta1
varnish_cache_projectvarnish_cache
3.0.0:beta2
varnish_cache_projectvarnish_cache
3.0.1
varnish_cache_projectvarnish_cache
3.0.2
varnish_cache_projectvarnish_cache
3.0.3
varnish_cache_projectvarnish_cache
3.0.4
varnish_cache_projectvarnish_cache
3.0.5
varnish_cache_projectvarnish_cache
3.0.6
debiandebian_linux
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
varnish
bullseye (security)
6.5.1-1+deb11u3
fixed
bullseye
6.5.1-1+deb11u3
fixed
bookworm
7.1.1-1.1
fixed
sid
7.6.0-2
fixed
trixie
7.6.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
varnish
zesty
not-affected
yakkety
not-affected
xenial
not-affected
wily
not-affected
trusty
Fixed 3.0.5-2ubuntu0.1
released
precise
ignored