FreeBSD : varnish -- DoS vulnerability in Varnish HTTP cache (d9dbe6e8-84da-11e3-98bd-080027f2d077)

Medium Nessus Plugin ID 72128


The remote FreeBSD host is missing a security-related update.


Varnish Cache Project reports :

If Varnish receives a certain illegal request, and the subroutine 'vcl_error{}' restarts the request, the varnishd worker process will crash with an assert.

The varnishd management process will restart the worker process, but there will be a brief interruption of service and the cache will be emptied, causing more traffic to go to the backend.

We are releasing this advisory because restarting from vcl_error{} is both fairly common and documented.

This is purely a denial of service vulnerability, there is no risk of privilege escalation.


Insert this at the top of your VCL file :

sub vcl_error { if (obj.status == 400 || obj.status == 413) { return(deliver); } }

Or add this test at the top of your existing vcl_error{}.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 72128

File Name: freebsd_pkg_d9dbe6e884da11e398bd080027f2d077.nasl

Version: $Revision: 1.1 $

Type: local

Published: 2014/01/26

Modified: 2014/01/27

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:varnish, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2014/01/25

Vulnerability Publication Date: 2013/10/30

Reference Information

CVE: CVE-2013-4484