CVE-2019-15892

EUVD-2019-6803
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
Affected Products (NVD)
VendorProductVersion
varnish-softwarevarnish_cache
6.0.0 ≤
𝑥
< 6.0.4
varnish_cache_projectvarnish_cache
6.1.0 ≤
𝑥
≤ 6.1.1
varnish_cache_projectvarnish_cache
6.2.0 ≤
𝑥
< 6.2.1
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
varnish
bookworm
7.1.1-1.1
fixed
bullseye
6.5.1-1+deb11u3
fixed
bullseye (security)
6.5.1-1+deb11u3
fixed
jessie
not-affected
sid
7.6.0-2
fixed
stretch
not-affected
trixie
7.6.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
varnish
bionic
not-affected
disco
ignored
eoan
ignored
focal
not-affected
trusty
not-affected
xenial
not-affected