7.8
CVE-2019-15892
- EPSS 5.55%
- Veröffentlicht 03.09.2019 21:15:10
- Zuletzt bearbeitet 21.11.2024 04:29:40
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Varnish-software ≫ Varnish Cache SwEditionlts Version >= 6.0.0 < 6.0.4
Varnish Cache Project ≫ Varnish Cache Version >= 6.1.0 <= 6.1.1
Varnish Cache Project ≫ Varnish Cache Version >= 6.2.0 < 6.2.1
Debian ≫ Debian Linux Version10.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 5.55% | 0.899 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
CWE-617 Reachable Assertion
The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.