All the vulnerabilites related to redhat - enterprise_linux_load_balancer
cve-2013-2175
Vulnerability from cvelistv5
Published
2013-08-19 00:00
Modified
2024-08-06 15:27
Severity ?
EPSS score ?
Summary
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
References
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1204.html | vendor-advisory, x_refsource_REDHAT | |
http://marc.info/?l=haproxy&m=137147915029705&w=2 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/54344 | third-party-advisory, x_refsource_SECUNIA | |
https://bugzilla.redhat.com/show_bug.cgi?id=974259 | x_refsource_MISC | |
http://www.debian.org/security/2013/dsa-2711 | vendor-advisory, x_refsource_DEBIAN | |
http://rhn.redhat.com/errata/RHSA-2013-1120.html | vendor-advisory, x_refsource_REDHAT | |
http://www.ubuntu.com/usn/USN-1889-1 | vendor-advisory, x_refsource_UBUNTU |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:27:41.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2013:1204", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1204.html" }, { "name": "[haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=haproxy\u0026m=137147915029705\u0026w=2" }, { "name": "54344", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54344" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=974259" }, { "name": "DSA-2711", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2711" }, { "name": "RHSA-2013:1120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1120.html" }, { "name": "USN-1889-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1889-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other \"hdr_*\" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-09-12T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2013:1204", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1204.html" }, { "name": "[haproxy] 20130617 [ANNOUNCE] haproxy-1.5-dev19 and 1.4.24 (security update)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=haproxy\u0026m=137147915029705\u0026w=2" }, { "name": "54344", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54344" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=974259" }, { "name": "DSA-2711", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2711" }, { "name": "RHSA-2013:1120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1120.html" }, { "name": "USN-1889-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1889-1" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-2175", "datePublished": "2013-08-19T00:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:27:41.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-08-19 13:07
Modified
2024-11-21 01:51
Severity ?
Summary
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:enterprise_linux_load_balancer:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF747A02-CF89-4D86-B260-DF437215E21E", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:enterprise_linux_load_balancer:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "8CD94576-817A-4EE0-9ED0-6A58532D7CEA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "699C7A0D-0244-4723-AE06-603E3E5078A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF66-936C-45C6-9FE8-5961A2BB3B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F7985877-53B9-4C56-A725-74FBD01EE264", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "265DFDC4-41FA-4620-B1EC-20B979872DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "139E7C8C-F97D-42F3-988A-53B4A925E69B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9A370-E422-4BE9-80E8-1BA813ADEE0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "EF6173EB-33A6-44EC-B5E6-39B7C795196C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "2AD679F3-3CFF-44BB-B417-4F0D87D9ACC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F20C6-EE6F-4BBD-B815-14CE0DE4B01B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "385E05ED-FFB7-4CD0-B887-492D164477CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "FC5E5576-9892-4815-BDA4-889491FAFEFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "3C764A18-6AF5-4084-A98E-A75B0331F0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "B9153828-8377-4B63-91D9-B96B571C0ABC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "DADD49E1-0E25-4EE8-9313-489879EB629B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "D1911301-2210-4F66-B478-04E8A1F61819", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "08189BCE-BF35-4314-8A84-1FC562DA5CC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "9C203854-3B89-46EA-B504-A4B3A3A84D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "D3CA3EB0-C6A8-4036-A935-565E22EC200A", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "6258BF7F-CA83-44B8-8018-132905B1B01C", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "536A1C11-F956-4E09-AAE4-B5BB9C900FE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "0915BC08-6B51-4C2C-8F86-971936D3EF77", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "D28F7139-59AA-4102-B1CC-E75AE8BDC8DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.21:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF1B6B-74F3-4040-8316-EDAAF9FDC1D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.22:*:*:*:*:*:*:*", "matchCriteriaId": "EA5E6802-4CB1-48EF-A589-4AE95A618137", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.4.23:*:*:*:*:*:*:*", "matchCriteriaId": "9EB8649A-8E5A-49EE-9428-AADC0C2E4E41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*", "matchCriteriaId": "AFA5BE61-7877-4A2C-8135-3F624569874D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*", "matchCriteriaId": "CD467A6D-295A-42DC-A0F7-5498FC95654B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*", "matchCriteriaId": "D96B78BA-2412-4E8D-9F4A-3A4480A8EF75", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*", "matchCriteriaId": "CAA641FA-60FF-4B43-8D2E-C42DEC79562D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*", "matchCriteriaId": "007F99A6-7FAD-4692-AF4A-E9919BA10EDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*", "matchCriteriaId": "06399F03-93C5-4882-8E8A-88712E6A3F29", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*", "matchCriteriaId": "B7B74CB1-63EF-4019-8AB5-96A1E8D2990D", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*", "matchCriteriaId": "5E08838E-DF28-425E-8440-B7CEC1A910CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*", "matchCriteriaId": "9D3436E0-CB58-4531-985B-FB90A991A7FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*", "matchCriteriaId": "183F43A3-71DC-479C-8197-17D374FAA421", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*", "matchCriteriaId": "352015C3-B8CC-4397-86CF-446ADB415054", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*", "matchCriteriaId": "76009FEA-17FD-4218-85C7-4EAC3FC008D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*", "matchCriteriaId": "04150D4D-49DF-4D51-8A0C-C1C74B024C1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*", "matchCriteriaId": "599A5CCE-7DDA-4AF5-8E10-85F6E0677CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*", "matchCriteriaId": "AC3C72A9-1958-42EA-B387-D52183541925", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*", "matchCriteriaId": "CF86C16E-08F1-4C8A-AA63-288EAE7D49E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*", "matchCriteriaId": "A9A44D0A-1104-4417-AEEF-07469D7F5BBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*", "matchCriteriaId": "EBA058C9-0FBD-44E7-9916-A59823351193", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*", "matchCriteriaId": "24367FAF-BC8B-45B7-9938-DE4A3EC289AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*", "matchCriteriaId": "599CB200-80B0-4BE3-916B-C02165F718F6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other \"hdr_*\" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable." }, { "lang": "es", "value": "HAProxy 1.4 anteiror a 1.4.24 y 1.5 anteiror a 1.5-dev19, cuando es configurado para usar el hdr_ip u otras funciones \"hdr_*\" con una cuenta de ocurrencia negativa, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (uso de indexaci\u00f3n negativa de array y ca\u00edda) a trav\u00e9s de una cabecera HTTP con un n\u00famero determinado de valores. Relacionado con la variable MAX_HDR_HISTORY." } ], "id": "CVE-2013-2175", "lastModified": "2024-11-21T01:51:11.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-19T13:07:58.227", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://marc.info/?l=haproxy\u0026m=137147915029705\u0026w=2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1120.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1204.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/54344" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2013/dsa-2711" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1889-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=974259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://marc.info/?l=haproxy\u0026m=137147915029705\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1120.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1204.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/54344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2013/dsa-2711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-1889-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=974259" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }