HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
References
Link | Resource |
---|---|
http://marc.info/?l=haproxy&m=137147915029705&w=2 | Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1120.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1204.html | Third Party Advisory |
http://secunia.com/advisories/54344 | |
http://www.debian.org/security/2013/dsa-2711 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-1889-1 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=974259 | Issue Tracking |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2013-08-19 13:07
Updated : 2024-02-04 18:16
NVD link : CVE-2013-2175
Mitre link : CVE-2013-2175
CVE.ORG link : CVE-2013-2175
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
haproxy
- haproxy
redhat
- enterprise_linux_load_balancer