CVE-2017-12425

An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack. The specific source-code filename containing the incorrect statement varies across releases.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:varnish-cache:varnish:4.0.2:rc-1:*:*:*:*:*:*
cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-1:*:*:*:*:*:*
cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-2:*:*:*:*:*:*
cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-2-proper:*:*:*:*:*:*
cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-3:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.4:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:varnish-cache:varnish:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.0:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.0:technology_preview1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.1:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.1:beta2:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.2:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.2:beta2:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.3:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.3:beta2:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.4:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta2:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta3:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.5:beta1:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.5:beta2:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:varnish-software:varnish_cache:4.1.7:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:varnish_cache_project:varnish_cache:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () http://www.debian.org/security/2017/dsa-3924 - () http://www.debian.org/security/2017/dsa-3924 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1477222 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1477222 - Issue Tracking, Third Party Advisory
References () https://bugzilla.suse.com/show_bug.cgi?id=1051917 - Issue Tracking, Third Party Advisory () https://bugzilla.suse.com/show_bug.cgi?id=1051917 - Issue Tracking, Third Party Advisory
References () https://github.com/varnishcache/varnish-cache/issues/2379 - Third Party Advisory () https://github.com/varnishcache/varnish-cache/issues/2379 - Third Party Advisory
References () https://lists.debian.org/debian-security-announce/2017/msg00186.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-security-announce/2017/msg00186.html - Mailing List, Third Party Advisory
References () https://www.varnish-cache.org/security/VSV00001.html#vsv00001 - Vendor Advisory () https://www.varnish-cache.org/security/VSV00001.html#vsv00001 - Vendor Advisory

Information

Published : 2017-08-04 09:29

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12425

Mitre link : CVE-2017-12425

CVE.ORG link : CVE-2017-12425


JSON object : View

Products Affected

varnish-software

  • varnish_cache

varnish-cache

  • varnish

varnish_cache_project

  • varnish_cache
CWE
CWE-190

Integer Overflow or Wraparound