| Summary | An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack. The specific source-code filename containing the incorrect statement varies across releases. |
|---|---|
| Publication Date | Aug. 4, 2017, 6:29 p.m. |
| Registration Date | Jan. 26, 2021, 1:14 p.m. |
| Last Update | Nov. 21, 2024, 12:09 p.m. |
| CVSS3.0 : HIGH | |
| スコア | 7.5 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| CVSS2.0 : MEDIUM | |
| Score | 5.0 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-2-proper:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-3:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-cache:varnish:4.0.2:rc-1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-cache:varnish:4.0.3:rc-2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:4.0.2:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:varnish-cache:varnish:4.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.0:technology_preview1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.2:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.1:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.0:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.3:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.5:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.3:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.2:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta2:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.7:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.1:beta1:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.4:beta3:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish-software:varnish_cache:4.1.5:beta1:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:5.0.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:varnish_cache_project:varnish_cache:5.1.2:*:*:*:*:*:*:* | |||||
| Title | Varnish HTTP Cache における整数オーバーフローの脆弱性 |
|---|---|
| Summary | Varnish HTTP Cache には、整数オーバーフローの脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 2, 2017, midnight |
| Registration Date | Sept. 14, 2017, 5:38 p.m. |
| Last Update | Sept. 14, 2017, 5:38 p.m. |
| varnish-cache.org |
| Varnish Cache 4.0.1 から 4.0.4 |
| Varnish Cache 4.1.0 から 4.1.7 |
| Varnish Cache 5.0.0 |
| Varnish Cache 5.1.0 から 5.1.2 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年09月14日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |