HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
References
Link | Resource |
---|---|
http://marc.info/?l=haproxy&m=137147915029705&w=2 | Patch Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1120.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2013-1204.html | Third Party Advisory |
http://secunia.com/advisories/54344 | |
http://www.debian.org/security/2013/dsa-2711 | Third Party Advisory |
http://www.ubuntu.com/usn/USN-1889-1 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=974259 | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2013-08-19T00:00:00
Updated: 2013-09-12T09:00:00
Reserved: 2013-02-19T00:00:00
Link: CVE-2013-2175
JSON object: View
NVD Information
Status : Analyzed
Published: 2013-08-19T13:07:58.227
Modified: 2016-12-07T23:43:07.780
Link: CVE-2013-2175
JSON object: View
Redhat Information
No data.