First published: Wed Nov 15 2017(Updated: )
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/varnish | 6.1.1-1+deb10u3 6.1.1-1+deb10u4 6.5.1-1+deb11u3 7.1.1-1.1 | |
Varnish-cache Varnish | >=4.1.0<4.1.9 | |
Varnish Cache Project Varnish Cache | >=5.0.0<5.2.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8807 is a vulnerability in Varnish HTTP Cache that allows remote attackers to obtain sensitive information from process memory.
CVE-2017-8807 works by exploiting a larger buffer than intended in certain circumstances involving Stevedore tran..
The severity of CVE-2017-8807 is critical, with a severity value of 9.1.
Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1, as well as certain versions of Debian Debian Linux and Microsoft .NET 6.0 are affected by CVE-2017-8807.
To fix CVE-2017-8807, update Varnish HTTP Cache to version 4.1.9 or higher for 4.1.x, or version 5.2.1 or higher for 5.x. If using Debian Debian Linux or Microsoft .NET 6.0, apply the relevant security patches.