Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libvarnishapi-dev", "binary_version": "3.0.5-2ubuntu0.1" }, { "binary_name": "libvarnishapi1", "binary_version": "3.0.5-2ubuntu0.1" }, { "binary_name": "varnish", "binary_version": "3.0.5-2ubuntu0.1" } ] }