First published: Tue Jul 23 2019(Updated: )
headerv2.go in mastercactapus proxyprotocol before 0.0.2, as used in the mastercactapus caddy-proxyprotocol plugin through 0.0.2 for Caddy, allows remote attackers to cause a denial of service (webserver panic and daemon crash) via a crafted HAProxy PROXY v2 request with truncated source/destination address data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/mastercactapus/proxyprotocol | <0.0.2 | 0.0.2 |
Haproxy Proxyprotocol | <0.0.2 |
https://github.com/mastercactapus/proxyprotocol/commit/5c4a101121fc3e868026189c7a73f7f19eef90ac
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-14243 is high.
CVE-2019-14243 affects the mastercactapus proxyprotocol package version 0.0.2.
CVE-2019-14243 allows remote attackers to cause a denial of service (webserver panic and daemon crash) via a crafted HAProxy PROXY v2 request with truncated source/destination.
To mitigate CVE-2019-14243, update the mastercactapus proxyprotocol package to version 0.0.2 or later.
You can find more information about CVE-2019-14243 in the following references: [1], [2], [3].