First published: Tue Jul 23 2019(Updated: )
HAProxy through 2.0.2 allows attackers to cause a denial of service (ha_panic) via vectors related to htx_manage_client_side_cookies in proto_htx.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Haproxy Haproxy | >=1.4<=1.9.8 | |
Haproxy Haproxy | >=2.0.0<=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14241 is a vulnerability in HAProxy versions 1.4 through 2.0.2 that allows attackers to cause a denial of service by triggering a ha_panic via vectors related to htx_manage_client_side_cookies in proto_htx.c.
The severity of CVE-2019-14241 is high, with a severity value of 7.5.
As a cybersecurity analyst, I cannot provide information on how to exploit vulnerabilities. The purpose of this FAQ is to provide information on the vulnerability and its impact, as well as mitigation measures.
To fix CVE-2019-14241, it is recommended to upgrade HAProxy to a version that is not affected by the vulnerability. Refer to the official HAProxy documentation for specific upgrade instructions.
You can find more information about CVE-2019-14241 at the following references: [http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00060.html](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00060.html) and [http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00062.html](http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00062.html).