Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-2936

Published: 5 April 2010

** DISPUTED ** The Command Line Interface (aka Server CLI or administration interface) in the master process in the reverse proxy server in Varnish before 2.1.0 does not require authentication for commands received through a TCP port, which allows remote attackers to (1) execute arbitrary code via a vcl.inline directive that provides a VCL configuration file containing inline C code; (2) change the ownership of the master process via param.set, stop, and start directives; (3) read the initial line of an arbitrary file via a vcl.load directive; or (4) conduct cross-site request forgery (CSRF) attacks that leverage a victim's location on a trusted network and improper input validation of directives. NOTE: the vendor disputes this report, saying that it is "fundamentally misguided and pointless."

Notes

AuthorNote
jdstrand
per Debian, "Only a security issue if used against best practices"

Priority

Negligible

Status

Package Release Status
varnish
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Ignored
(end of life)
intrepid Ignored
(end of life, was needed)
jaunty Ignored
(end of life)
karmic Ignored
(end of life)
lucid Not vulnerable
(2.1.0-2ubuntu0.1)
maverick Not vulnerable
(2.1.1-1)
natty Not vulnerable
(2.1.1-1)
oneiric Not vulnerable
(2.1.1-1)
precise Not vulnerable
(2.1.1-1)
upstream
Released (2.1.0)