An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.2.1-2", "binary_name": "libvarnishapi-dev" }, { "binary_version": "6.2.1-2", "binary_name": "libvarnishapi2" }, { "binary_version": "6.2.1-2", "binary_name": "libvarnishapi2-dbgsym" }, { "binary_version": "6.2.1-2", "binary_name": "varnish" }, { "binary_version": "6.2.1-2", "binary_name": "varnish-dbgsym" }, { "binary_version": "6.2.1-2", "binary_name": "varnish-doc" } ] }