7.5
CVSSv2

CVE-2018-19115

Published: 08/11/2018 Updated: 24/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

keepalived prior to 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

keepalived keepalived

debian debian linux 8.0

redhat enterprise linux server 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server tus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux server eus 7.6

Vendor Advisories

Debian Bug report logs - #914393 keepalived: CVE-2018-19115 heap-based buffer overflow and DoS Package: keepalived; Maintainer for keepalived is Alexander Wirt <formorer@debianorg>; Source for keepalived is src:keepalived (PTS, buildd, popcon) Reported by: Markus Koschany <apo@debianorg> Date: Thu, 22 Nov 2018 22:5 ...
Keepalived could be made to crash or run programs if it received specially crafted network traffic ...
Keepalived could be made to crash or run programs if it received specially crafted network traffic ...
Synopsis Important: keepalived security update Type/Severity Security Advisory: Important Topic An update for keepalived is now available for Red Hat Enterprise Linux 75 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Synopsis Important: keepalived security update Type/Severity Security Advisory: Important Topic An update for keepalived is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base ...
Synopsis Important: keepalived security update Type/Severity Security Advisory: Important Topic An update for keepalived is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability S ...
Heap-based buffer overflow vulnerability in extract_status_code() function in lib/htmlc that parses HTTP status code returned from web server allows malicious web server or man-in-the-middle attacker pretending to be a web server to cause either a denial of service or potentially execute arbitrary code on keepalived load balancer(CVE-2018-19115) ...
Heap-based buffer overflow vulnerability in extract_status_code() function in lib/htmlc that parses HTTP status code returned from web server allows malicious web server or man-in-the-middle attacker pretending to be a web server to cause either a denial of service or potentially execute arbitrary code on keepalived load balancer ...