First published: Wed Apr 10 2013(Updated: )
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aprox Aproxengine | =1.4 | |
Aprox Aproxengine | =1.4.20 | |
Aprox Aproxengine | =1.4.22 | |
Aprox Aproxengine | =1.5-dev | |
Aprox Aproxengine | =1.5-dev17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1912 has a severity rating that indicates it can lead to denial of service and potential remote code execution.
To fix CVE-2013-1912, upgrade HAProxy to version 1.4.23 or later or 1.5-dev18 or later.
CVE-2013-1912 affects HAProxy versions 1.4 through 1.4.22 and all 1.5-dev versions up to 1.5-dev17.
CVE-2013-1912 is classified as a buffer overflow vulnerability.
Yes, CVE-2013-1912 can be exploited by remote attackers under specific circumstances.