openSUSE Security Update : haproxy (openSUSE-2019-2645)

high Nessus Plugin ID 131721

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for haproxy to version 2.0.10 fixes the following issues :

HAProxy was updated to 2.0.10 	

Security issues fixed :

- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with transfer-encoding header missing the 'chunked' (bsc#1154980).

- Fixed an improper handling of headers which could have led to injecting LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)

- Fixed an issue where HEADER frames in idle streams are not rejected and thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed :

- Macro change in the spec file (bsc#1082318)

More information regarding the release at:
http://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d46151555 1b95daae20954b3053ce87e	

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Solution

Update the affected haproxy packages.

See Also

http://www.nessus.org/u?6e2d3256

https://bugzilla.opensuse.org/show_bug.cgi?id=1082318

https://bugzilla.opensuse.org/show_bug.cgi?id=1154980

https://bugzilla.opensuse.org/show_bug.cgi?id=1157712

https://bugzilla.opensuse.org/show_bug.cgi?id=1157714

Plugin Details

Severity: High

ID: 131721

File Name: openSUSE-2019-2645.nasl

Version: 1.3

Type: local

Agent: unix

Published: 12/5/2019

Updated: 4/5/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2019-18277

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:haproxy-debugsource, p-cpe:/a:novell:opensuse:haproxy, p-cpe:/a:novell:opensuse:haproxy-debuginfo, cpe:/o:novell:opensuse:15.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/4/2019

Vulnerability Publication Date: 10/23/2019

Reference Information

CVE: CVE-2019-18277