Lucene search

K
amazonAmazonALAS-2014-276
HistoryJan 14, 2014 - 4:09 p.m.

Medium: varnish

2014-01-1416:09:00
alas.aws.amazon.com
14

0.039 Low

EPSS

Percentile

92.0%

Issue Overview:

Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.

varnish 3.0.3 uses world-readable permissions for the /var/log/varnish/ directory and the log files in the directory, which allows local users to obtain sensitive information by reading the files. NOTE: some of these details are obtained from third party information.

Affected Packages:

varnish

Issue Correction:
Run yum update varnish to update your system.

New Packages:

i686:  
    varnish-debuginfo-3.0.5-1.14.amzn1.i686  
    varnish-docs-3.0.5-1.14.amzn1.i686  
    varnish-libs-devel-3.0.5-1.14.amzn1.i686  
    varnish-libs-3.0.5-1.14.amzn1.i686  
    varnish-3.0.5-1.14.amzn1.i686  
  
src:  
    varnish-3.0.5-1.14.amzn1.src  
  
x86_64:  
    varnish-libs-devel-3.0.5-1.14.amzn1.x86_64  
    varnish-libs-3.0.5-1.14.amzn1.x86_64  
    varnish-3.0.5-1.14.amzn1.x86_64  
    varnish-docs-3.0.5-1.14.amzn1.x86_64  
    varnish-debuginfo-3.0.5-1.14.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-0345, CVE-2013-4484

Mitre: CVE-2013-0345, CVE-2013-4484