5
CVSSv2

CVE-2016-5360

Published: 30/06/2016 Updated: 01/07/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

HAproxy 1.6.x prior to 1.6.6, when a deny comes from a reqdeny rule, allows remote malicious users to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 16.04

haproxy haproxy 1.6.4

haproxy haproxy 1.6.3

haproxy haproxy 1.6.2

haproxy haproxy 1.6.1

haproxy haproxy 1.6.5

haproxy haproxy 1.6.0

Vendor Advisories

Debian Bug report logs - #826869 haproxy: CVE-2016-5360: remote denial of service via reqdeny Package: src:haproxy; Maintainer for src:haproxy is Debian HAProxy Maintainers <haproxy@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 9 Jun 2016 16:27:02 UTC Severity: important Tags: ...
HAProxy could be made to crash if it received specially crafted network traffic ...
HAproxy 16x before 166, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors ...