First published: Wed Dec 12 2018(Updated: )
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | <=1.8.14 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Redhat Openshift Container Platform | =3.11 | |
redhat/haproxy | <1.8.15 | 1.8.15 |
ubuntu/haproxy | <1.8.8-1ubuntu0.3 | 1.8.8-1ubuntu0.3 |
ubuntu/haproxy | <1.8.13-2ubuntu0.1 | 1.8.13-2ubuntu0.1 |
ubuntu/haproxy | <1.8.15-1 | 1.8.15-1 |
debian/haproxy | 2.2.9-2+deb11u6 2.6.12-1+deb12u1 2.9.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20103 is a vulnerability in HAProxy versions through 1.8.14 that allows for infinite recursion or stack exhaustion through a crafted packet.
CVE-2018-20103 has a severity rating of 7.5, which is considered high.
To fix CVE-2018-20103, you should update to HAProxy version 1.8.15 or later.
You can find more information about CVE-2018-20103 at the following references: [http://git.haproxy.org/?p=haproxy.git;a=commit;h=58df5aea0a0c926b2238f65908f5e9f83d1cca25](http://git.haproxy.org/?p=haproxy.git;a=commit;h=58df5aea0a0c926b2238f65908f5e9f83d1cca25), [http://www.securityfocus.com/bid/106280](http://www.securityfocus.com/bid/106280), [https://access.redhat.com/errata/RHBA-2019:0326](https://access.redhat.com/errata/RHBA-2019:0326).
The CWE number for CVE-2018-20103 is 835.