Vulnerability Details : CVE-2012-2942
Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2012-2942
- cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2942
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2942
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.1
|
MEDIUM | AV:N/AC:H/Au:N/C:P/I:P/A:P |
4.9
|
6.4
|
NIST |
CWE ids for CVE-2012-2942
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2942
-
http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
-
http://www.openwall.com/lists/oss-security/2012/05/23/12
oss-security - CVE request: haproxy trash buffer overflow flaw
-
http://secunia.com/advisories/49261
Sign inVendor Advisory
-
http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b
Index of /git
-
http://haproxy.1wt.eu/#news
HAProxy - The Reliable, High Performance TCP/HTTP Load Balancer
-
http://www.openwall.com/lists/oss-security/2012/05/23/15
oss-security - Re: CVE request: haproxy trash buffer overflow flaw
-
http://www.ubuntu.com/usn/USN-1800-1
USN-1800-1: HAProxy vulnerabilities | Ubuntu security notices
-
http://security.gentoo.org/glsa/glsa-201301-02.xml
HAProxy: Arbitrary code execution (GLSA 201301-02) — Gentoo security
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/75777
HAProxy trash buffer overflow CVE-2012-2942 Vulnerability Report
-
http://www.securityfocus.com/bid/53647
HAProxy Trash Buffer Overflow Vulnerability
-
http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b
Index of /gitVendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/05/28/1
oss-security - Duplicate CVE identifiers (CVE-2012-2391 and CVE-2012-2942) assigned to HAProxy issue
-
http://www.debian.org/security/2013/dsa-2711
Debian -- Security Information -- DSA-2711-1 haproxy
Jump to