CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
55.5%
USN-5474-1 fixed vulnerabilities in Varnish Cache. Unfortunately the fix for
CVE-2020-11653 was incomplete. This update fixes the problem.
Original advisory details:
It was discovered that Varnish Cache could have an assertion failure when a
TLS termination proxy uses PROXY version 2. A remote attacker could possibly
use this issue to restart the daemon and cause a performance loss.
(CVE-2020-11653)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | varnish | < 6.2.1-2ubuntu0.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | libvarnishapi-dev | < 6.2.1-2ubuntu0.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | libvarnishapi2 | < 6.2.1-2ubuntu0.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | libvarnishapi2-dbgsym | < 6.2.1-2ubuntu0.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | varnish-dbgsym | < 6.2.1-2ubuntu0.2 | UNKNOWN |
Ubuntu | 20.04 | noarch | varnish-doc | < 6.2.1-2ubuntu0.2 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
55.5%