7.5
CVE-2026-40395
- EPSS 0.06%
- Veröffentlicht 12.04.2026 19:21:09
- Zuletzt bearbeitet 17.04.2026 14:37:34
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of service (daemon panic) for shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which is normally the original read-only request from which req is derived (readable and writable from VCL). This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller operates shared VCL deployments. If the amended req contained too many header fields for req0, this would have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise server. This could be used as a Denial of Service attack vector by malicious clients.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Varnish-software ≫ Varnish Enterprise Version <= 6.0.15
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater1
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater10
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater11
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater2
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater3
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater4
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater5
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater6
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater7
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater8
Varnish-software ≫ Varnish Enterprise Version6.0.16 Updater9
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.188 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
| cve@mitre.org | 4 | 2.2 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.