Executive Summary
Summary | |
---|---|
Title | haproxy security update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0729 | First vendor Publication | 2013-04-09 |
Vendor | RedHat | Last vendor Modification | 2013-04-09 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated haproxy package that fixes one security issue is now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenShift Enterprise Node - x86_64 3. Description: HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications. A buffer overflow flaw was found in the way HAProxy handled pipelined HTTP requests. A remote attacker could send pipelined HTTP requests that would cause HAProxy to crash or, potentially, execute arbitrary code with the privileges of the user running HAProxy. This issue only affected systems using all of the following combined configuration options: HTTP keep alive enabled, HTTP keywords in TCP inspection rules, and request appending rules. (CVE-2013-1912) In Red Hat OpenShift Enterprise, the HAProxy cartridge is added to your application when you select to have your application scaled. Due to the way this cartridge is currently used in Red Hat OpenShift Enterprise, the CVE-2013-1912 issue is not exploitable. Red Hat would like to thank Willy Tarreau of HAProxy upstream for reporting this issue. Upstream acknowledges Yves Lafon from the W3C as the original reporter. Users of Red Hat OpenShift Enterprise 1.1.3 are advised to upgrade to this updated package, which contains a backported patch to correct this issue. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 947581 - CVE-2013-1912 haproxy: rewrite rules flaw can lead to arbitrary code execution |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0729.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18194 | |||
Oval ID: | oval:org.mitre.oval:def:18194 | ||
Title: | USN-1800-1 -- haproxy vulnerabilities | ||
Description: | HAProxy could be made to crash or run programs if it received specially crafted network traffic. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-1800-1 CVE-2012-2942 CVE-2013-1912 | Version: | 7 |
Platform(s): | Ubuntu 12.10 Ubuntu 12.04 Ubuntu 11.10 | Product(s): | haproxy |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20471 | |||
Oval ID: | oval:org.mitre.oval:def:20471 | ||
Title: | RHSA-2013:0868: haproxy security update (Moderate) | ||
Description: | Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0868-01 CESA-2013:0868 CVE-2013-1912 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | haproxy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23619 | |||
Oval ID: | oval:org.mitre.oval:def:23619 | ||
Title: | ELSA-2013:0868: haproxy security update (Moderate) | ||
Description: | Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0868-01 CVE-2013-1912 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | haproxy |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201307-01.nasl - Type : ACT_GATHER_INFO |
2013-06-20 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2711.nasl - Type : ACT_GATHER_INFO |
2013-05-30 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2013-0868.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0868.nasl - Type : ACT_GATHER_INFO |
2013-05-29 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130528_haproxy_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-04-29 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4807.nasl - Type : ACT_GATHER_INFO |
2013-04-29 | Name : The remote Fedora host is missing a security update. File : fedora_2013-4827.nasl - Type : ACT_GATHER_INFO |
2013-04-29 | Name : The remote Fedora host is missing a security update. File : fedora_2013-6253.nasl - Type : ACT_GATHER_INFO |
2013-04-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1800-1.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2013-04-11 17:20:19 |
|
2013-04-11 00:20:46 |
|
2013-04-09 21:18:23 |
|