CVE-2021-28543

Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
mitreCNA
4 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AC:H/AV:N/A:L/C:N/I:N/PR:N/S:C/UI:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
VendorProductVersion
varnish-cachevarnish-modules
𝑥
< 0.17.1
varnish-cachevarnish-modules_klarlack
𝑥
< 0.17.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
varnish-modules
bullseye
0.16.0-2.1
fixed
bookworm
0.20.0-2
fixed
sid
0.25.0-1
fixed
trixie
0.25.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
varnish-modules
groovy
not-affected
focal
dne
bionic
not-affected
xenial
dne
trusty
dne