7.5

CVE-2026-40395

Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of service (daemon panic) for shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which is normally the original read-only request from which req is derived (readable and writable from VCL). This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller operates shared VCL deployments. If the amended req contained too many header fields for req0, this would have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise server. This could be used as a Denial of Service attack vector by malicious clients.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Varnish-softwareVarnish Enterprise Version <= 6.0.15
Varnish-softwareVarnish Enterprise Version6.0.16 Updater1
Varnish-softwareVarnish Enterprise Version6.0.16 Updater10
Varnish-softwareVarnish Enterprise Version6.0.16 Updater11
Varnish-softwareVarnish Enterprise Version6.0.16 Updater2
Varnish-softwareVarnish Enterprise Version6.0.16 Updater3
Varnish-softwareVarnish Enterprise Version6.0.16 Updater4
Varnish-softwareVarnish Enterprise Version6.0.16 Updater5
Varnish-softwareVarnish Enterprise Version6.0.16 Updater6
Varnish-softwareVarnish Enterprise Version6.0.16 Updater7
Varnish-softwareVarnish Enterprise Version6.0.16 Updater8
Varnish-softwareVarnish Enterprise Version6.0.16 Updater9
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.188
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cve@mitre.org 4 2.2 1.4
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.