[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2018-20102 -- haproxy

ID: oval:org.secpod.oval:def:2000621Date: (C)2019-06-19   (M)2024-01-02
Class: VULNERABILITYFamily: unix




An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.

Platform:
Debian 9.x
Product:
haproxy
Reference:
CVE-2018-20102
CVE    1
CVE-2018-20102
CPE    2
cpe:/o:debian:debian_linux:9.x
cpe:/a:haproxy:haproxy

© SecPod Technologies