[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2HAPROXY2-2023-002 --- haproxy2

ID: oval:org.secpod.oval:def:1701717Date: (C)2023-10-26   (M)2024-01-02
Class: PATCHFamily: unix




An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size. The upstream bug report describes this issue as follows:An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way

Platform:
Amazon Linux 2
Product:
haproxy2
Reference:
ALAS2HAPROXY2-2023-002
CVE-2018-20102
CVE-2023-0836
CVE    2
CVE-2023-0836
CVE-2018-20102
CPE    1
cpe:/o:amazon:linux:2

© SecPod Technologies