FreeBSD : varnish -- DoS vulnerability in Varnish HTTP cache (d9dbe6e8-84da-11e3-98bd-080027f2d077)

medium Nessus Plugin ID 72128

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Varnish Cache Project reports :

If Varnish receives a certain illegal request, and the subroutine 'vcl_error{}' restarts the request, the varnishd worker process will crash with an assert.

The varnishd management process will restart the worker process, but there will be a brief interruption of service and the cache will be emptied, causing more traffic to go to the backend.

We are releasing this advisory because restarting from vcl_error{} is both fairly common and documented.

This is purely a denial of service vulnerability, there is no risk of privilege escalation.

Workaround

Insert this at the top of your VCL file :

sub vcl_error { if (obj.status == 400 || obj.status == 413) { return(deliver); } }

Or add this test at the top of your existing vcl_error{}.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?ac6e5049

http://www.nessus.org/u?3493e18f

Plugin Details

Severity: Medium

ID: 72128

File Name: freebsd_pkg_d9dbe6e884da11e398bd080027f2d077.nasl

Version: 1.4

Type: local

Published: 1/27/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:varnish, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/25/2014

Vulnerability Publication Date: 10/30/2013

Reference Information

CVE: CVE-2013-4484