First published: Wed Sep 04 2024(Updated: )
HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions, as exploited in the wild in 2024.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aprox Aproxengine | >=2.9.0<2.9.10 | |
Aprox Aproxengine | >=3.0.0<3.0.4 | |
Aprox Aproxengine | =3.1-dev0 | |
Aprox Aproxengine | =3.1-dev1 | |
Aprox Aproxengine | =3.1-dev2 | |
Aprox Aproxengine | =3.1-dev3 | |
Aprox Aproxengine | =3.1-dev4 | |
Aprox Aproxengine | =3.1-dev5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45506 is classified as a remote denial of service vulnerability.
The affected HAProxy versions are 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6.
To fix CVE-2024-45506, upgrade your HAProxy to version 2.9.10 or 3.0.4 and later.
CVE-2024-45506 facilitates remote denial of service attacks against the HAProxy service.
As of the latest information, there is no publicly available exploit code for CVE-2024-45506.