5

CVE-2013-2175

HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.

Data is provided by the National Vulnerability Database (NVD)
DebianDebian Linux Version6.0
CanonicalUbuntu Linux Version12.04 Update- Editionlts
CanonicalUbuntu Linux Version12.10
CanonicalUbuntu Linux Version13.04
HaproxyHaproxy Version1.4
HaproxyHaproxy Version1.4.0
HaproxyHaproxy Version1.4.1
HaproxyHaproxy Version1.4.2
HaproxyHaproxy Version1.4.3
HaproxyHaproxy Version1.4.4
HaproxyHaproxy Version1.4.5
HaproxyHaproxy Version1.4.6
HaproxyHaproxy Version1.4.7
HaproxyHaproxy Version1.4.8
HaproxyHaproxy Version1.4.9
HaproxyHaproxy Version1.4.10
HaproxyHaproxy Version1.4.11
HaproxyHaproxy Version1.4.12
HaproxyHaproxy Version1.4.13
HaproxyHaproxy Version1.4.14
HaproxyHaproxy Version1.4.15
HaproxyHaproxy Version1.4.16
HaproxyHaproxy Version1.4.17
HaproxyHaproxy Version1.4.18
HaproxyHaproxy Version1.4.19
HaproxyHaproxy Version1.4.20
HaproxyHaproxy Version1.4.21
HaproxyHaproxy Version1.4.22
HaproxyHaproxy Version1.4.23
HaproxyHaproxy Version1.5 Updatedev
HaproxyHaproxy Version1.5 Updatedev0
HaproxyHaproxy Version1.5 Updatedev1
HaproxyHaproxy Version1.5 Updatedev10
HaproxyHaproxy Version1.5 Updatedev11
HaproxyHaproxy Version1.5 Updatedev12
HaproxyHaproxy Version1.5 Updatedev13
HaproxyHaproxy Version1.5 Updatedev14
HaproxyHaproxy Version1.5 Updatedev15
HaproxyHaproxy Version1.5 Updatedev16
HaproxyHaproxy Version1.5 Updatedev17
HaproxyHaproxy Version1.5 Updatedev18
HaproxyHaproxy Version1.5 Updatedev2
HaproxyHaproxy Version1.5 Updatedev3
HaproxyHaproxy Version1.5 Updatedev4
HaproxyHaproxy Version1.5 Updatedev5
HaproxyHaproxy Version1.5 Updatedev6
HaproxyHaproxy Version1.5 Updatedev7
HaproxyHaproxy Version1.5 Updatedev8
HaproxyHaproxy Version1.5 Updatedev9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.199
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-284 Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.