Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1912

Опубликовано: 10 апр. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 5.1

Описание

Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.

РелизСтатусПримечание
devel

released

1.4.18-0ubuntu3
hardy

ignored

end of life
lucid

ignored

end of life
oneiric

released

1.4.15-1ubuntu0.1
precise

released

1.4.18-0ubuntu1.1
quantal

released

1.4.18-0ubuntu2.1
raring

released

1.4.18-0ubuntu3
upstream

released

1.4.23

Показывать по

5.1 Medium

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.

nvd
почти 13 лет назад

Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.

debian
почти 13 лет назад

Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5- ...

github
больше 3 лет назад

Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.

fstec
больше 12 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

5.1 Medium

CVSS2