Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11100

Опубликовано: 02 апр. 2020
Источник: debian
EPSS Высокий

Описание

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
haproxyfixed2.0.13-2package
haproxynot-affectedstretchpackage
haproxynot-affectedjessiepackage

Примечания

  • https://git.haproxy.org/?p=haproxy-2.1.git;a=commit;h=f17f86304f187b0f10ca6a8d46346afd9851a543

EPSS

Процентиль: 99%
0.74791
Высокий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

CVSS3: 8.8
redhat
почти 6 лет назад

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

CVSS3: 8.8
nvd
почти 6 лет назад

In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.

suse-cvrf
почти 6 лет назад

Security update for haproxy

suse-cvrf
почти 6 лет назад

Security update for haproxy

EPSS

Процентиль: 99%
0.74791
Высокий