Debian DSA-4649-1 : haproxy - security update

high Nessus Plugin ID 135416

Synopsis

The remote Debian host is missing a security-related update.

Description

Felix Wilhelm of Google Project Zero discovered that HAProxy, a TCP/HTTP reverse proxy, did not properly handle HTTP/2 headers. This would allow an attacker to write arbitrary bytes around a certain location on the heap, resulting in denial-of-service or potential arbitrary code execution.

Solution

Upgrade the haproxy packages.

For the stable distribution (buster), this problem has been fixed in version 1.8.19-1+deb10u2.

See Also

https://security-tracker.debian.org/tracker/source-package/haproxy

https://packages.debian.org/source/buster/haproxy

https://www.debian.org/security/2020/dsa-4649

Plugin Details

Severity: High

ID: 135416

File Name: debian_DSA-4649.nasl

Version: 1.4

Type: local

Agent: unix

Published: 4/14/2020

Updated: 3/19/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2020-11100

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:10.0, p-cpe:/a:debian:debian_linux:haproxy

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/2/2020

Vulnerability Publication Date: 4/2/2020

Reference Information

CVE: CVE-2020-11100

DSA: 4649