ID CVE-2019-20637
Summary An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.
References
Vulnerable Configurations
  • cpe:2.3:a:varnish-cache:varnish_cache:*:*:*:*:-:*:*:*
    cpe:2.3:a:varnish-cache:varnish_cache:*:*:*:*:-:*:*:*
  • cpe:2.3:a:varnish-software:varnish_cache:6.0.0:*:*:*:lts:*:*:*
    cpe:2.3:a:varnish-software:varnish_cache:6.0.0:*:*:*:lts:*:*:*
  • cpe:2.3:a:varnish-software:varnish_cache:6.0.1:*:*:*:lts:*:*:*
    cpe:2.3:a:varnish-software:varnish_cache:6.0.1:*:*:*:lts:*:*:*
  • cpe:2.3:a:varnish-software:varnish_cache:6.0.2:*:*:*:lts:*:*:*
    cpe:2.3:a:varnish-software:varnish_cache:6.0.2:*:*:*:lts:*:*:*
  • cpe:2.3:a:varnish-software:varnish_cache:6.0.3:*:*:*:lts:*:*:*
    cpe:2.3:a:varnish-software:varnish_cache:6.0.3:*:*:*:lts:*:*:*
  • cpe:2.3:a:varnish-software:varnish_cache:6.0.4:*:*:*:lts:*:*:*
    cpe:2.3:a:varnish-software:varnish_cache:6.0.4:*:*:*:lts:*:*:*
  • cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
    cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
  • cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 02-08-2022 - 19:03)
Impact:
Exploitability:
CWE CWE-212
CAPEC
  • Windows ::DATA Alternate Data Stream
    An attacker exploits the functionality of Microsoft NTFS Alternate Data Streams (ADS) to undermine system security. ADS allows multiple "files" to be stored in one directory entry referenced as filename:streamname. One or more alternate data streams may be stored in any file or directory. Normal Microsoft utilities do not show the presence of an ADS stream attached to a file. The additional space for the ADS is not recorded in the displayed file size. The additional space for ADS is accounted for in the used space on the volume. An ADS can be any type of file. ADS are copied by standard Microsoft utilities between NTFS volumes. ADS can be used by an attacker or intruder to hide tools, scripts, and data from detection by normal system utilities. Many anti-virus programs do not check for or scan ADS. Windows Vista does have a switch (-R) on the command line DIR command that will display alternate streams.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
redhat via4
rpms
  • varnish-0:6.0.6-2.module+el8.3.0+6843+b3b42fcc
  • varnish-devel-0:6.0.6-2.module+el8.3.0+6843+b3b42fcc
  • varnish-docs-0:6.0.6-2.module+el8.3.0+6843+b3b42fcc
  • varnish-modules-0:0.15.0-5.module+el8.3.0+6843+b3b42fcc
  • varnish-modules-debuginfo-0:0.15.0-5.module+el8.3.0+6843+b3b42fcc
  • varnish-modules-debugsource-0:0.15.0-5.module+el8.3.0+6843+b3b42fcc
refmap via4
misc http://varnish-cache.org/security/VSV00004.html#vsv00004
suse
  • openSUSE-SU-2020:0808
  • openSUSE-SU-2020:0819
Last major update 02-08-2022 - 19:03
Published 08-04-2020 - 23:15
Last modified 02-08-2022 - 19:03
Back to Top