Ubuntu update for varnish



Published: 2022-06-09
Risk Medium
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2019-20637
CVE-2020-11653
CVE-2021-36740
CVE-2022-23959
CWE-ID CWE-200
CWE-20
CWE-444
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Ubuntu
Operating systems & Components / Operating system

libvarnishapi2 (Ubuntu package)
Operating systems & Components / Operating system package or component

varnish (Ubuntu package)
Operating systems & Components / Operating system package or component

libvarnishapi1 (Ubuntu package)
Operating systems & Components / Operating system package or component

Vendor Canonical Ltd.

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Information disclosure

EUVDB-ID: #VU30309

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-20637

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

An issue was discovered in Varnish Cache before 6.0.5 LTS, 6.1.x and 6.2.x before 6.2.2, and 6.3.x before 6.3.1. It does not clear a pointer between the handling of one client request and the next request within the same connection. This sometimes causes information to be disclosed from the connection workspace, such as data structures associated with previous requests within this connection or VCL-related temporary headers.

Mitigation

Update the affected package varnish to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

libvarnishapi2 (Ubuntu package): before 6.6.1-1ubuntu0.2

varnish (Ubuntu package): before 6.6.1-1ubuntu0.2

libvarnishapi1 (Ubuntu package): before 5.2.1-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5474-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

EUVDB-ID: #VU30310

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-11653

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

An issue was discovered in Varnish Cache before 6.0.6 LTS, 6.1.x and 6.2.x before 6.2.3, and 6.3.x before 6.3.2. It occurs when communication with a TLS termination proxy uses PROXY version 2. There can be an assertion failure and daemon restart, which causes a performance loss.

Mitigation

Update the affected package varnish to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

libvarnishapi2 (Ubuntu package): before 6.6.1-1ubuntu0.2

varnish (Ubuntu package): before 6.6.1-1ubuntu0.2

libvarnishapi1 (Ubuntu package): before 5.2.1-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5474-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU55501

Risk: Medium

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-36740

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/2 requests. A remote attacker can send a specially crafted HTTP/2 POST request with a large Content-Length header to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache or bypass VCL authorization.

Mitigation

Update the affected package varnish to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

libvarnishapi2 (Ubuntu package): before 6.6.1-1ubuntu0.2

varnish (Ubuntu package): before 6.6.1-1ubuntu0.2

libvarnishapi1 (Ubuntu package): before 5.2.1-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5474-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Inconsistent interpretation of HTTP requests

EUVDB-ID: #VU60291

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-23959

CWE-ID: CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Exploit availability: No

Description

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP/1 requests. A remote attacker can send a specially crafted HTTP/1 request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.

Mitigation

Update the affected package varnish to the latest version.

Vulnerable software versions

Ubuntu: 18.04 - 22.04

libvarnishapi2 (Ubuntu package): before 6.6.1-1ubuntu0.2

varnish (Ubuntu package): before 6.6.1-1ubuntu0.2

libvarnishapi1 (Ubuntu package): before 5.2.1-1ubuntu0.1

External links

http://ubuntu.com/security/notices/USN-5474-1


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###