First published: Wed Aug 23 2023(Updated: )
libvmod-digest before 1.0.3, as used in Varnish Enterprise 6.0.x before 6.0.11r5, has an out-of-bounds memory access during base64 decoding, leading to both authentication bypass and information disclosure; however, the exact attack surface will depend on the particular VCL (Varnish Configuration Language) configuration in use.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Varnish Cache | >=6.0.0<6.0.11 | |
Varnish Cache | =6.0.11 | |
Varnish Cache | =6.0.11-r1 | |
Varnish Cache | =6.0.11-r2 | |
Varnish Cache | =6.0.11-r3 | |
Varnish Cache | =6.0.11-r4 | |
Varnish Software Vmod Digest | <1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-41104.
The severity of CVE-2023-41104 is medium.
Varnish Enterprise 6.0.x versions before 6.0.11r5 and libvmod-digest versions before 1.0.3 are affected.
CVE-2023-41104 can lead to both authentication bypass and information disclosure due to an out-of-bounds memory access during base64 decoding.
You can find more information about CVE-2023-41104 at the following sources: - [Varnish Software Security Advisory VSV00012](https://docs.varnish-software.com/security/VSV00012/) - [libvmod-digest 1.0.3 Release](https://github.com/varnish/libvmod-digest/releases/tag/libvmod-digest-1.0.3) - [Varnish Cache Security Advisory VSV00012](https://www.varnish-cache.org/security/VSV00012.html)