Headline
CVE-2015-8852: Debian -- Security Information -- DSA-3553-1 varnish
Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
Debian Security Advisory
Date Reported:
22 Apr 2016
Affected Packages:
varnish
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 783510.
In Mitre’s CVE dictionary: CVE-2015-8852.
More information:
Régis Leroy from Makina Corpus discovered that varnish, a caching HTTP reverse proxy, is vulnerable to HTTP smuggling issues, potentially resulting in cache poisoning or bypassing of access control policies.
For the oldstable distribution (wheezy), this problem has been fixed in version 3.0.2-2+deb7u2.
We recommend that you upgrade your varnish packages.