CVE-2018-20615

An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:-:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev0:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev1:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev10:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev11:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev2:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev3:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev4:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev5:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev6:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev7:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev8:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.9.0:dev9:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.6:*:*:*:*:*:*:*

History

21 Nov 2024, 04:01

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.html - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/106645 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106645 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory () https://access.redhat.com/errata/RHBA-2019:0327 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0275 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0275 - Third Party Advisory
References () https://usn.ubuntu.com/3858-1/ - Third Party Advisory () https://usn.ubuntu.com/3858-1/ - Third Party Advisory
References () https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html - () https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html -

07 Nov 2023, 02:56

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/haproxy@formilux.org/msg32304.html', 'name': '[haproxy@formilux.org] 20190108 [ANNOUNCE] haproxy-1.8.17', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html -

Information

Published : 2019-03-21 16:00

Updated : 2024-11-21 04:01


NVD link : CVE-2018-20615

Mitre link : CVE-2018-20615

CVE.ORG link : CVE-2018-20615


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • openshift_container_platform

canonical

  • ubuntu_linux

opensuse

  • leap

haproxy

  • haproxy
CWE
CWE-125

Out-of-bounds Read