Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
{ "ubuntu_priority": "medium", "binaries": [ { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "libvarnishapi-dev" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "libvarnishapi-dev-dbgsym" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "libvarnishapi1" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "libvarnishapi1-dbgsym" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "varnish" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "varnish-dbg" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "varnish-dbgsym" }, { "binary_version": "3.0.5-2ubuntu0.1", "binary_name": "varnish-doc" } ], "availability": "No subscription required" }