Lucene search

K
gentooGentoo FoundationGLSA-201301-02
HistoryJan 08, 2013 - 12:00 a.m.

HAProxy: Arbitrary code execution

2013-01-0800:00:00
Gentoo Foundation
security.gentoo.org
28

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.105

Percentile

95.0%

Background

HAProxy is a TCP/HTTP reverse proxy for high availability environments.

Description

A boundary error in HAProxy could cause a buffer overflow when header rewriting is enabled and the configuration sets global.tune.bufsize to a value greater than the default (16384 bytes).

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All HAProxy users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/haproxy-1.4.21"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-proxy/haproxy< 1.4.21UNKNOWN

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.105

Percentile

95.0%