Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-20637


An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.


Published

2020-04-08T23:15:12.623

Last Modified

2024-11-21T04:38:56.193

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-212

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application varnish-cache varnish_cache < 6.2.2 Yes
Application varnish-cache varnish_cache < 6.3.1 Yes
Application varnish-software varnish_cache < 6.0.5 Yes
Application opensuse backports_sle 15.0 Yes
Operating System opensuse leap 15.1 Yes

References