First published: Mon Jul 06 2015(Updated: )
The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =8.0 | |
HAProxy HAProxy | =1.5-dev | |
HAProxy HAProxy | =1.5-dev0 | |
HAProxy HAProxy | =1.5-dev1 | |
HAProxy HAProxy | =1.5-dev10 | |
HAProxy HAProxy | =1.5-dev11 | |
HAProxy HAProxy | =1.5-dev12 | |
HAProxy HAProxy | =1.5-dev13 | |
HAProxy HAProxy | =1.5-dev14 | |
HAProxy HAProxy | =1.5-dev15 | |
HAProxy HAProxy | =1.5-dev16 | |
HAProxy HAProxy | =1.5-dev17 | |
HAProxy HAProxy | =1.5-dev18 | |
HAProxy HAProxy | =1.5-dev19 | |
HAProxy HAProxy | =1.5-dev2 | |
HAProxy HAProxy | =1.5-dev3 | |
HAProxy HAProxy | =1.5-dev4 | |
HAProxy HAProxy | =1.5-dev5 | |
HAProxy HAProxy | =1.5-dev6 | |
HAProxy HAProxy | =1.5-dev7 | |
HAProxy HAProxy | =1.5-dev8 | |
HAProxy HAProxy | =1.5-dev9 | |
HAProxy HAProxy | =1.5.0 | |
HAProxy HAProxy | =1.5.1 | |
HAProxy HAProxy | =1.5.2 | |
HAProxy HAProxy | =1.5.3 | |
HAProxy HAProxy | =1.5.4 | |
HAProxy HAProxy | =1.5.5 | |
HAProxy HAProxy | =1.5.6 | |
HAProxy HAProxy | =1.5.7 | |
HAProxy HAProxy | =1.5.8 | |
HAProxy HAProxy | =1.5.9 | |
HAProxy HAProxy | =1.5.10 | |
HAProxy HAProxy | =1.5.11 | |
HAProxy HAProxy | =1.5.12 | |
HAProxy HAProxy | =1.5.13 | |
HAProxy HAProxy | =1.6-dev0 | |
Ubuntu Linux | =14.10 | |
Ubuntu Linux | =15.04 | |
SUSE Linux Enterprise High Availability Extension | =12 | |
openSUSE OpenStack Cloud | =5 | |
openSUSE | =13.2 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server eus | =7.1 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux workstation | =7.0 | |
SUSE Linux Enterprise High Availability | =12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3281 has been classified as having a medium severity due to potential unauthorized access to sensitive information.
To fix CVE-2015-3281, upgrade HAProxy to version 1.5.14 or later.
CVE-2015-3281 can be exploited by remote attackers sending crafted requests that leverage uninitialized memory access.
HAProxy versions 1.5.x before 1.5.14 and 1.6-dev prior to the patch are affected by CVE-2015-3281.
CVE-2015-3281 can expose uninitialized memory contents from previous requests, posing a risk of sensitive information disclosure.