FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-29 10:45:39 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
f25a34b1-910d-11ee-a1a2-641c67a117d8varnish -- HTTP/2 Rapid Reset Attack

Varnish Cache Project reports:

A denial of service attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker can create a large volume of streams and immediately reset them without ever reaching the maximum number of concurrent streams allowed for the session, causing the Varnish server to consume unnecessary resources processing requests for which the response will not be delivered.


Discovery 2023-11-13
Entry 2023-12-02
varnish7
< 7.4.2

varnish6
< 6.6.3

CVE-2023-44487
https://varnish-cache.org/security/VSV00013.html
b10d1afa-6087-11ed-8c5e-641c67a117d8varnish -- Request Smuggling Vulnerability

Varnish Cache Project reports:

A request smuggling attack can be performed on Varnish Cache servers by requesting that certain headers are made hop-by-hop, preventing the Varnish Cache servers from forwarding critical headers to the backend. Among the headers that can be filtered this way are both Content-Length and Host, making it possible for an attacker to both break the HTTP/1 protocol framing, and bypass request to host routing in VCL.


Discovery 2022-11-08
Entry 2022-11-09
varnish7
< 7.2.1

https://varnish-cache.org/security/VSV00010.html
05b7180b-e571-11ee-a1c0-0050569f0b83www/varnish7 -- Denial of Service

The Varnish Development Team reports:

A denial of service attack can be performed on Varnish Cacher servers that have the HTTP/2 protocol turned on. An attacker can let the servers HTTP/2 connection control flow window run out of credits indefinitely and prevent progress in the processing of streams, retaining the associated resources.


Discovery 2019-04-19
Entry 2024-03-18
varnish7
< 7.4.3

CVE-2023-43622
https://varnish-cache.org/security/VSV00014.html#vsv00014
5b8d8dee-6088-11ed-8c5e-641c67a117d8varnish -- HTTP/2 Request Forgery Vulnerability

Varnish Cache Project reports:

A request forgery attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker may introduce characters through the HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This may in turn be used to successfully exploit vulnerabilities in a server behind the Varnish server.


Discovery 2022-11-08
Entry 2022-11-09
varnish7
< 7.2.1

varnish6
le 6.6.2

https://varnish-cache.org/security/VSV00011.html