Impact
The vulnerability allows an attacker to trigger a workspace overflow by sending a request that carries an excessive number of header fields. The affected function, headerplus.write_req0(), updates the underlying request object that VCL uses for switching VCL contexts. Excess headers overflow the allocated workspace, causing the daemon to panic and crash. This results in a denial of service against the Varnish Enterprise server.
Affected Systems
Varnish Software’s Varnish Enterprise product is affected. Versions prior to 6.0.16r12 are vulnerable. No additional vendor or product details are specified beyond the product name.
Risk and Exploitability
The CVSS base score is 4.0, indicating moderate impact. EPSS is not available and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation data. The attack vector is presumably remote, as a malicious client can craft HTTP requests with many headers. If exploited, the server would crash, leading to temporary denial of service until the process is restarted.
OpenCVE Enrichment