Vulnerability Details : CVE-2015-3281
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2015-3281
Probability of exploitation activity in the next 30 days: 0.34%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-3281
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-3281
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3281
-
http://rhn.redhat.com/errata/RHSA-2015-1741.html
RHSA-2015:1741 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2015-2666.html
RHSA-2015:2666 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4
Repositories
-
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html
[security-announce] openSUSE-SU-2015:1831-1: important: Security updateMailing List;Third Party Advisory
-
http://www.ubuntu.com/usn/USN-2668-1
USN-2668-1: HAProxy vulnerability | Ubuntu security noticesThird Party Advisory
-
http://www.haproxy.org/news.html
HAProxy - The Reliable, High Performance TCP/HTTP Load BalancerPatch;Vendor Advisory
-
http://www.debian.org/security/2015/dsa-3301
Debian -- Security Information -- DSA-3301-1 haproxyThird Party Advisory
-
http://www.securityfocus.com/bid/75554
HAProxy CVE-2015-3281 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html
[security-announce] SUSE-SU-2015:1663-1: important: Security update forMailing List;Third Party Advisory
Products affected by CVE-2015-3281
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:openstack_cloud:5:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:linux_enterprise_high_availability_extension:12:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.8:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.9:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev19:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.6:dev0:*:*:*:*:*:*