First published: Wed Dec 04 2019(Updated: )
Tim Düsterhus discovered that HAProxy incorrectly handled certain HTTP/2 headers. An attacker could possibly use this issue to execute arbitrary code through CRLF injection.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/haproxy | <2.0.5-1ubuntu0.3 | 2.0.5-1ubuntu0.3 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/haproxy | <1.8.19-1ubuntu1.3 | 1.8.19-1ubuntu1.3 |
Ubuntu Linux | =19.04 | |
All of | ||
ubuntu/haproxy | <1.8.8-1ubuntu0.9 | 1.8.8-1ubuntu0.9 |
Ubuntu Linux | =18.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4212-1 is considered high due to the potential for arbitrary code execution through CRLF injection.
To fix USN-4212-1, update HAProxy to version 2.0.5-1ubuntu0.3 or 1.8.19-1ubuntu1.3 on the affected Ubuntu systems.
USN-4212-1 affects HAProxy versions earlier than 2.0.5-1ubuntu0.3, 1.8.19-1ubuntu1.3, and 1.8.8-1ubuntu0.9.
Yes, USN-4212-1 can be exploited remotely if the affected versions of HAProxy are exposed to malicious HTTP/2 requests.
USN-4212-1 impacts HAProxy on Ubuntu versions 19.10, 19.04, and 18.04.