Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-932v-h827-3qvr

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.

EPSS

Процентиль: 32%
0.00124
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.

redhat
около 11 лет назад

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.

nvd
почти 11 лет назад

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.

debian
почти 11 лет назад

Multiple integer overflows in the http_request_forward_body function i ...

oracle-oval
почти 11 лет назад

ELSA-2014-1292: haproxy security update (MODERATE)

EPSS

Процентиль: 32%
0.00124
Низкий