An issue was discovered in Varnish Cache before 6.0.4 LTS, and 6.1.x and 6.2.x before 6.2.1. An HTTP/1 parsing failure allows a remote attacker to trigger an assert by sending crafted HTTP/1 requests. The assert will cause an automatic restart with a clean cache, which makes it a Denial of Service attack.
{ "binaries": [ { "binary_name": "libvarnishapi-dev", "binary_version": "6.2.1-2" }, { "binary_name": "libvarnishapi2", "binary_version": "6.2.1-2" }, { "binary_name": "libvarnishapi2-dbgsym", "binary_version": "6.2.1-2" }, { "binary_name": "varnish", "binary_version": "6.2.1-2" }, { "binary_name": "varnish-dbgsym", "binary_version": "6.2.1-2" }, { "binary_name": "varnish-doc", "binary_version": "6.2.1-2" } ], "availability": "No subscription required" }