Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://article.gmane.org/gmane.comp.web.haproxy/17726 - Exploit | |
References | () http://article.gmane.org/gmane.comp.web.haproxy/18097 - | |
References | () http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commitdiff%3Bh=b4d05093bc89f71377230228007e69a1434c1a0c - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1292.html - | |
References | () http://secunia.com/advisories/59936 - | |
References | () http://secunia.com/advisories/61507 - | |
References | () http://www.openwall.com/lists/oss-security/2014/09/09/23 - |
07 Nov 2023, 02:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-09-30 14:55
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6269
Mitre link : CVE-2014-6269
CVE.ORG link : CVE-2014-6269
JSON object : View
Products Affected
haproxy
- haproxy
CWE
CWE-189
Numeric Errors