Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2942

Опубликовано: 27 мая 2012
Источник: debian

Описание

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
haproxyfixed1.4.23-1package

Примечания

  • According to upstream information this only was fixed in 1.4.21

  • only a issue if using non-default value for global.tune.bufsize configuration option

  • Reported as duplicate with CVE-2012-2391 http://seclists.org/oss-sec/2012/q2/417

Связанные уязвимости

ubuntu
больше 13 лет назад

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.

nvd
больше 13 лет назад

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.

github
больше 3 лет назад

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.