CVE-2015-3281
Vulnerability from cvelistv5
Published
2015-07-06 14:55
Modified
2024-08-06 05:39
Severity ?
Summary
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
References
secalert@redhat.comhttp://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-1741.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2015-2666.htmlThird Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2015/dsa-3301Third Party Advisory
secalert@redhat.comhttp://www.haproxy.org/news.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/75554Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2668-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-1741.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-2666.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3301Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.haproxy.org/news.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/75554Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2668-1Third Party Advisory
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T05:39:32.116Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2015:1741",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-1741.html"
          },
          {
            "name": "openSUSE-SU-2015:1831",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.haproxy.org/news.html"
          },
          {
            "name": "RHSA-2015:2666",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2015-2666.html"
          },
          {
            "name": "USN-2668-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-2668-1"
          },
          {
            "name": "SUSE-SU-2015:1663",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4"
          },
          {
            "name": "DSA-3301",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2015/dsa-3301"
          },
          {
            "name": "75554",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/75554"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-07-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-23T18:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2015:1741",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-1741.html"
        },
        {
          "name": "openSUSE-SU-2015:1831",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.haproxy.org/news.html"
        },
        {
          "name": "RHSA-2015:2666",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2015-2666.html"
        },
        {
          "name": "USN-2668-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-2668-1"
        },
        {
          "name": "SUSE-SU-2015:1663",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4"
        },
        {
          "name": "DSA-3301",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2015/dsa-3301"
        },
        {
          "name": "75554",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/75554"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2015-3281",
    "datePublished": "2015-07-06T14:55:00",
    "dateReserved": "2015-04-10T00:00:00",
    "dateUpdated": "2024-08-06T05:39:32.116Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2015-3281\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-07-06T15:59:06.167\",\"lastModified\":\"2024-11-21T02:29:04.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n buffer_slow_realign en HAProxy 1.5.x anterior a 1.5.14 y 1.6-dev no realinea correctamente un buffer que es utilizado para datos salientes pendientes, lo que permite a atacantes remotos obtener informaci\u00f3n sensible (contenidos de memoria no inicializada de solicitudes previas) a trav\u00e9s de una solicitud manipulada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA5BE61-7877-4A2C-8135-3F624569874D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD467A6D-295A-42DC-A0F7-5498FC95654B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D96B78BA-2412-4E8D-9F4A-3A4480A8EF75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAA641FA-60FF-4B43-8D2E-C42DEC79562D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*\",\"matchCriteriaId\":\"007F99A6-7FAD-4692-AF4A-E9919BA10EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*\",\"matchCriteriaId\":\"06399F03-93C5-4882-8E8A-88712E6A3F29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7B74CB1-63EF-4019-8AB5-96A1E8D2990D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E08838E-DF28-425E-8440-B7CEC1A910CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3436E0-CB58-4531-985B-FB90A991A7FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*\",\"matchCriteriaId\":\"183F43A3-71DC-479C-8197-17D374FAA421\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*\",\"matchCriteriaId\":\"352015C3-B8CC-4397-86CF-446ADB415054\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*\",\"matchCriteriaId\":\"76009FEA-17FD-4218-85C7-4EAC3FC008D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev19:*:*:*:*:*:*\",\"matchCriteriaId\":\"75896B9E-7D14-48A5-A6EE-743BA1C3F6F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*\",\"matchCriteriaId\":\"04150D4D-49DF-4D51-8A0C-C1C74B024C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*\",\"matchCriteriaId\":\"599A5CCE-7DDA-4AF5-8E10-85F6E0677CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3C72A9-1958-42EA-B387-D52183541925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF86C16E-08F1-4C8A-AA63-288EAE7D49E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9A44D0A-1104-4417-AEEF-07469D7F5BBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA058C9-0FBD-44E7-9916-A59823351193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*\",\"matchCriteriaId\":\"24367FAF-BC8B-45B7-9938-DE4A3EC289AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*\",\"matchCriteriaId\":\"599CB200-80B0-4BE3-916B-C02165F718F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8346999-B3EE-4BBA-ABEA-F9D07017EBAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD95164-7653-4433-97AB-8D0BA0B89828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA2EA9FE-BCD8-483D-91B2-FCDD096E9F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF8DB5D-B3DC-4EAC-A3A7-06846615980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD4D155-8308-4C56-9DC9-7350C4194C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D34DF90-6C92-416C-8ACB-CBA3B2C70681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A97FE8DC-B6CF-40A2-930F-28735D31077E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE68254-3D29-4A81-9C53-DF8B607EE35E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0E32C0-5AE6-4FFD-934E-B8073F1508F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BD56C71-A400-43BB-A38A-707F9042FCA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E50BB83-244C-4A4E-898D-6128A32B81D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39E49693-4162-45BD-98D6-9831E6E170B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4977E9EA-8F9D-4176-B928-C501D3C5260A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A064420-E3C5-4E40-853E-10FE2A93D16A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:haproxy:haproxy:1.6:dev0:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F961D45-9983-464A-9C20-BE8022AAEC07\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A63F39-30BE-443F-AF10-6245587D3359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:openstack_cloud:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70EF794-432D-413D-A9B8-4875E8DE2B6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_high_availability_extension:12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"057121A7-3FF7-45DA-AEBD-A97F050B85B2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8CD4EF-DC90-40BB-A721-6EC087507906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}],\"references\":[{\"url\":\"http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1741.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2666.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3301\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.haproxy.org/news.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75554\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2668-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-1741.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2666.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3301\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.haproxy.org/news.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/75554\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2668-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.