ID CVE-2014-6269
Summary Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
References
Vulnerable Configurations
  • cpe:2.3:a:haproxy:haproxy:1.5:dev23:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5:dev23:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5:dev24:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5:dev24:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5:dev25:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5:dev25:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5:dev26:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5:dev26:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 02-10-2014 - 18:31)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 1136552
title CVE-2014-6269 haproxy: remote client denial of service vulnerability
oval
AND
  • comment haproxy is earlier than 0:1.5.2-3.el7_0
    oval oval:com.redhat.rhsa:tst:20141292005
  • comment haproxy is signed with Red Hat redhatrelease2 key
    oval oval:com.redhat.rhsa:tst:20130868006
  • OR
    • comment Red Hat Enterprise Linux 7 Client is installed
      oval oval:com.redhat.rhba:tst:20150364001
    • comment Red Hat Enterprise Linux 7 Server is installed
      oval oval:com.redhat.rhba:tst:20150364002
    • comment Red Hat Enterprise Linux 7 Workstation is installed
      oval oval:com.redhat.rhba:tst:20150364003
    • comment Red Hat Enterprise Linux 7 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20150364004
rhsa
id RHSA-2014:1292
released 2014-09-24
severity Moderate
title RHSA-2014:1292: haproxy security update (Moderate)
rpms haproxy-0:1.5.2-3.el7_0
refmap via4
confirm http://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
mlist
  • [haproxy] 20140805 segfault in http_skip_chunk_crlf after 16G of data has passed through haproxy
  • [haproxy] 20140902 [ANNOUNCE] haproxy-1.5.4
  • [oss-security] 20140909 Re: CVE Request: haproxy read out of bounds
secunia
  • 59936
  • 61507
Last major update 02-10-2014 - 18:31
Published 30-09-2014 - 14:55
Back to Top