Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of service (daemon panic) for shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which is normally the original read-only request from which req is derived (readable and writable from VCL). This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller operates shared VCL deployments. If the amended req contained too many header fields for req0, this would have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise server. This could be used as a Denial of Service attack vector by malicious clients.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Varnish: Varnish Enterprise: Denial of Service via workspace overflow | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Sun, 12 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Varnish Enterprise before 6.0.16r12 allows a "workspace overflow" denial of service (daemon panic) for shared VCL. The headerplus.write_req0() function from vmod_headerplus updates the underlying req0, which is normally the original read-only request from which req is derived (readable and writable from VCL). This is useful in the active VCL, after amending req, to prepare a refined req0 before switching to a different VCL with the return (vcl(<label>)) action. This is for example how the Varnish Controller operates shared VCL deployments. If the amended req contained too many header fields for req0, this would have resulted in a workspace overflow that would in turn trigger a panic and crash the Varnish Enterprise server. This could be used as a Denial of Service attack vector by malicious clients. | |
| First Time appeared |
Varnish-software
Varnish-software varnish Enterprise |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:varnish-software:varnish_enterprise:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Varnish-software
Varnish-software varnish Enterprise |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-04-12T19:21:09.265Z
Updated: 2026-04-13T15:45:30.791Z
Reserved: 2026-04-12T19:21:08.847Z
Link: CVE-2026-40395
Updated: 2026-04-13T15:45:27.838Z
Status : Awaiting Analysis
Published: 2026-04-12T20:16:18.893
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-40395
ReportizFlow