Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-12425
HistoryAug 04, 2017 - 12:00 a.m.

CVE-2017-12425

2017-08-0400:00:00
ubuntu.com
ubuntu.com
13

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

78.6%

An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0
through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the
varnishd source code means that particular invalid requests from the client
can trigger an assert, related to an Integer Overflow. This causes the
varnishd worker process to abort and restart, losing the cached contents in
the process. An attacker can therefore crash the varnishd worker process on
demand and effectively keep it from serving content - a Denial-of-Service
attack. The specific source-code filename containing the incorrect
statement varies across releases.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu16.04noarchvarnish< 4.1.1-1ubuntu0.2UNKNOWN
ubuntu17.04noarchvarnish< 5.0.0-7ubuntu0.1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

78.6%