Description
vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4034-1 | varnish security update |
EUVD |
EUVD-2017-17750 | vbf_stp_error in bin/varnishd/cache/cache_fetch.c in Varnish HTTP Cache 4.1.x before 4.1.9 and 5.x before 5.2.1 allows remote attackers to obtain sensitive information from process memory because a VFP_GetStorage buffer is larger than intended in certain circumstances involving -sfile Stevedore transient objects. |
Ubuntu USN |
USN-4824-1 | Varnish vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-05T16:48:21.686Z
Reserved: 2017-05-07T00:00:00.000Z
Link: CVE-2017-8807
No data.
Status : Modified
Published: 2017-11-16T02:29:05.660
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-8807
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN