CVE-2018-20615

HIGH

Haproxy < 1.8.19 - Out-of-Bounds Read

Title source: rule
STIX 2.1

Description

An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/106645
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHSA-2019:0275
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html
Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/3858-1/
Mailing List mailing-list x_refsource_mlist
https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html
Third Party Advisory vendor-advisory x_refsource_redhat
https://access.redhat.com/errata/RHBA-2019:0327

Scores

CVSS v3 7.5
EPSS 0.0017
EPSS Percentile 37.1%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-125
Status published
Products (11)
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
canonical/ubuntu_linux 18.10
haproxy/haproxy 1.9.0 (13 CPE variants)
haproxy/haproxy 1.8.0 - 1.8.19
opensuse/leap 15.0
redhat/enterprise_linux 7.0
redhat/enterprise_linux 7.4
redhat/enterprise_linux 7.5
redhat/enterprise_linux 7.6
... and 1 more
Published Mar 21, 2019
Tracked Since Feb 18, 2026