Description
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106645
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0275
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3858-1/
Mailing List mailing-list
x_refsource_mlist
https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html
Third Party Advisory vendor-advisory
x_refsource_redhat
https://access.redhat.com/errata/RHBA-2019:0327
Scores
CVSS v3
7.5
EPSS
0.0017
EPSS Percentile
37.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (11)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
haproxy/haproxy
1.9.0 (13 CPE variants)
haproxy/haproxy
1.8.0 - 1.8.19
opensuse/leap
15.0
redhat/enterprise_linux
7.0
redhat/enterprise_linux
7.4
redhat/enterprise_linux
7.5
redhat/enterprise_linux
7.6
... and 1 more
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026