CVE-2017-12425Integer Overflow or Wraparound in Varnish

Severity
7.5HIGHNVD
EPSS
1.0%
top 22.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 4
Latest updateMay 17

Description

An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through 4.1.7, 5.0.0, and 5.1.0 through 5.1.2. A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert, related to an Integer Overflow. This causes the varnishd worker process to abort and restart, losing the cached contents in the process. An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content -

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

Debianvarnish-cache/varnish< 5.0.0-7.1+3
NVDvarnish-cache/varnish4.0.2, 4.0.3, 4.1.0+2

🔴Vulnerability Details

3
GHSA
GHSA-jhqh-84v8-3cw2: An issue was discovered in Varnish HTTP Cache 42022-05-17
OSV
CVE-2017-12425: An issue was discovered in Varnish HTTP Cache 42017-08-04
CVEList
CVE-2017-12425: An issue was discovered in Varnish HTTP Cache 42017-08-04

📋Vendor Advisories

2
Red Hat
varnish: Missing check for integer overflow when handling chunk sizes in HTTP requests2017-08-02
Debian
CVE-2017-12425: varnish - An issue was discovered in Varnish HTTP Cache 4.0.1 through 4.0.4, 4.1.0 through...2017

💬Community

3
Bugzilla
CVE-2017-12425 varnish: Missing check for integer overflow when handling chunk sizes in HTTP requests [fedora-all]2017-08-02
Bugzilla
CVE-2017-12425 varnish: Missing check for integer overflow when handling chunk sizes in HTTP requests [epel-all]2017-08-02
Bugzilla
CVE-2017-12425 varnish: Missing check for integer overflow when handling chunk sizes in HTTP requests2017-08-01
CVE-2017-12425 — Integer Overflow or Wraparound | cvebase