Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-28543


Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers.


Published

2021-03-16T15:15:13.843

Last Modified

2024-11-21T05:59:48.890

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-476
    CWE-617

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application varnish-cache varnish-modules < 0.17.1 Yes
Application varnish-cache varnish-modules_klarlack < 0.17.1 Yes
Operating System fedoraproject fedora 34 Yes

References