CVE-2012-2942

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:39

Type Values Removed Values Added
References () http://haproxy.1wt.eu/#news - () http://haproxy.1wt.eu/#news -
References () http://haproxy.1wt.eu/download/1.4/src/CHANGELOG - () http://haproxy.1wt.eu/download/1.4/src/CHANGELOG -
References () http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b - () http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b -
References () http://secunia.com/advisories/49261 - Vendor Advisory () http://secunia.com/advisories/49261 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201301-02.xml - () http://security.gentoo.org/glsa/glsa-201301-02.xml -
References () http://www.debian.org/security/2013/dsa-2711 - () http://www.debian.org/security/2013/dsa-2711 -
References () http://www.openwall.com/lists/oss-security/2012/05/23/12 - () http://www.openwall.com/lists/oss-security/2012/05/23/12 -
References () http://www.openwall.com/lists/oss-security/2012/05/23/15 - () http://www.openwall.com/lists/oss-security/2012/05/23/15 -
References () http://www.openwall.com/lists/oss-security/2012/05/28/1 - () http://www.openwall.com/lists/oss-security/2012/05/28/1 -
References () http://www.securityfocus.com/bid/53647 - () http://www.securityfocus.com/bid/53647 -
References () http://www.ubuntu.com/usn/USN-1800-1 - () http://www.ubuntu.com/usn/USN-1800-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/75777 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/75777 -

07 Nov 2023, 02:11

Type Values Removed Values Added
References
  • {'url': 'http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b', 'name': 'http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b -

Information

Published : 2012-05-27 20:55

Updated : 2024-11-21 01:39


NVD link : CVE-2012-2942

Mitre link : CVE-2012-2942

CVE.ORG link : CVE-2012-2942


JSON object : View

Products Affected

haproxy

  • haproxy
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer