Date: Sat, 25 Jan 2014 09:24:38 +0000 (UTC) From: Kubilay Kocak <koobs@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r340998 - head/security/vuxml Message-ID: <201401250924.s0P9OcpF023046@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: koobs Date: Sat Jan 25 09:24:38 2014 New Revision: 340998 URL: http://svnweb.freebsd.org/changeset/ports/340998 QAT: https://qat.redports.org/buildarchive/r340998/ Log: Document Varnish HTTP Cache < 3.0.5 DoS Vulnerability Reviewed by: remko Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sat Jan 25 09:15:12 2014 (r340997) +++ head/security/vuxml/vuln.xml Sat Jan 25 09:24:38 2014 (r340998) @@ -51,6 +51,52 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d9dbe6e8-84da-11e3-98bd-080027f2d077"> + <topic>varnish -- DoS vulnerability in Varnish HTTP cache</topic> + <affects> + <package> + <name>varnish</name> + <range><lt>3.0.5</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Varnish Cache Project reports:</p> + <blockquote cite="https://www.varnish-cache.org/lists/pipermail/varnish-announce/2013-October/000686.html"> + <p>If Varnish receives a certain illegal request, and the subroutine + 'vcl_error{}' restarts the request, the varnishd worker process + will crash with an assert. + </p> + <p>The varnishd management process will restart the worker process, but + there will be a brief interruption of service and the cache will be + emptied, causing more traffic to go to the backend. + </p> + <p>We are releasing this advisory because restarting from vcl_error{} is both fairly common and documented.</p> + <p>This is purely a denial of service vulnerability, there is no risk of privilege escalation.</p> + <p>Workaround</p> + <p>Insert this at the top of your VCL file:</p> + <pre> + sub vcl_error { + if (obj.status == 400 || obj.status == 413) { + return(deliver); + } + } + + Or add this test at the top of your existing vcl_error{}. + </pre> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4484</cvename> + <mlist>https://www.varnish-cache.org/lists/pipermail/varnish-announce/2013-October/000686.html</mlist> + </references> + <dates> + <discovery>2013-10-30</discovery> + <entry>2014-01-25</entry> + </dates> + </vuln> + <vuln vid="c0ef849e-84ac-11e3-bec4-9c4e36909cc0"> <topic>linux-flashplugin -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201401250924.s0P9OcpF023046>