CVE-2013-4484
Published Nov 1, 2013
Last updated 2 years ago
Overview
- Description
- Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:varnish-cache:varnish:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5165A847-E7D5-41F2-9A77-D7465702B96E" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B706CA6-18AA-44ED-9E16-997F1F847080", "versionEndIncluding": "3.0.4" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1278AE6-8B9F-44EF-948B-953206B7A575" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE5217DE-F372-4088-8945-9C8261B7C08B" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "622A6B9E-CD78-4468-8581-2416A8BE0082" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6D1D3CB-BF9E-42D9-AF80-4E6AF7B750F4" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51384B7B-90E1-4306-BB8E-7CDCB5F5A73D" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75E49897-80FB-429A-8B3F-A1D1E6478EAA" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23BBDAF2-2C7A-4064-8353-F0A7B2889B94" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84124000-3FF8-4580-ADF6-9EC0BB780811" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4A9806F-8165-445F-A79D-C103E4F5F8F2" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16127BD0-F056-4C1F-A966-EC9BF0DCAD61" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A431D90-57CE-45E4-8E80-845A50831303" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB3AEF03-4413-46AF-921C-82B425304170" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBD89F4F-78C7-4A3C-A3AC-C48D697262BF" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49CC7329-F9C3-4CE4-8B10-BE9BAC24615D" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99769363-66C9-4059-AC07-726BCF541312" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E8FFA83-A7B0-480B-BA50-4EE2D17C8D86" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2585ABA8-DB5A-4AB0-9A4E-E9705D1F1A4F" }, { "criteria": "cpe:2.3:a:varnish_cache_project:varnish_cache:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0850185C-FA95-44F2-B4AF-454D053A811B" } ], "operator": "OR" } ] } ]