CVE-2013-1912
Published: 10 April 2013
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
Priority
Status
Package | Release | Status |
---|---|---|
haproxy Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
oneiric |
Released
(1.4.15-1ubuntu0.1)
|
|
precise |
Released
(1.4.18-0ubuntu1.1)
|
|
quantal |
Released
(1.4.18-0ubuntu2.1)
|
|
raring |
Released
(1.4.18-0ubuntu3)
|
|
upstream |
Released
(1.4.23)
|
|
Patches: upstream: http://git.1wt.eu/web?p=haproxy-1.4.git;a=commitdiff;h=dc80672211 |