HAProxy 'tcp-request content' Buffer Overflow Vulnerability

medium Nessus Network Monitor Plugin ID 6906

Synopsis

The remote host is running a load balancer with a buffer overflow vulnerability

Description

Based on the version obtained for HAProxy, the remote host is running load balancing software that is potentially affected by a buffer overflow vulnerability in the 'tcp-request content' inspection mechanism. A remote attacker could exploit this issue with a specially crafted request, potentially resulting in a denial of service and possible arbitrary code execution on the remote host.

Solution

Upgrade to HAProxy version 1.4.23 / 1.5-dev18 or higher.

See Also

http://haproxy.1wt.eu/download/1.4/src/CHANGELOG

http://haproxy.1wt.eu/download/1.5/src/CHANGELOG

http://freecode.com/projects/haproxy/releases/353574

http://freecode.com/projects/haproxy/releases/353576

Plugin Details

Severity: Medium

ID: 6906

Family: Web Servers

Published: 7/5/2013

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:haproxy:haproxy

Patch Publication Date: 4/3/2012

Vulnerability Publication Date: 3/29/2012

Reference Information

CVE: CVE-2013-1912

BID: 58820