Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-1912 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 5.1 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (haproxy) | RHSA-2013:0868 | 2013-05-28 |
Red Hat OpenShift Enterprise Client Tools (haproxy) | RHSA-2013:0729 | 2013-04-09 |