CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
78.6%
An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0
through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the
varnishd source code means that particular invalid requests from the client
can trigger an assert, related to an Integer Overflow. This causes the
varnishd worker process to abort and restart, losing the cached contents in
the process. An attacker can therefore crash the varnishd worker process on
demand and effectively keep it from serving content - a Denial-of-Service
attack. The specific source-code filename containing the incorrect
statement varies across releases.
github.com/varnishcache/varnish-cache/issues/2379
launchpad.net/bugs/cve/CVE-2017-12425
lists.debian.org/debian-security-announce/2017/msg00186.html
nvd.nist.gov/vuln/detail/CVE-2017-12425
security-tracker.debian.org/tracker/CVE-2017-12425
www.cve.org/CVERecord?id=CVE-2017-12425
www.varnish-cache.org/security/VSV00001.html#vsv00001
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
78.6%