Haproxy

Haproxy

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.82%
  • Veröffentlicht 23.10.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 04:32:57

A flaw was found in HAProxy before 2.0.6. In legacy mode, messages featuring a transfer-encoding header missing the "chunked" value were not being correctly rejected. The impact was limited but if combined with the "http-reuse always" setting, it cou...

Exploit
  • EPSS 37.04%
  • Veröffentlicht 23.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:16

HAProxy through 2.0.2 allows attackers to cause a denial of service (ha_panic) via vectors related to htx_manage_client_side_cookies in proto_htx.c.

  • EPSS 0.01%
  • Veröffentlicht 09.05.2019 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:53

HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error.

  • EPSS 0.14%
  • Veröffentlicht 21.03.2019 16:00:36
  • Zuletzt bearbeitet 21.11.2024 04:01:51

An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are s...

  • EPSS 0.1%
  • Veröffentlicht 12.12.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:53

An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaus...

  • EPSS 0.03%
  • Veröffentlicht 12.12.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:00:52

An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-...

  • EPSS 0.23%
  • Veröffentlicht 21.09.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:49:29

A flaw was discovered in the HPACK decoder of HAProxy, before 1.8.14, that is used for HTTP/2. An out-of-bounds read access in hpack_valid_idx() resulted in a remote crash and denial of service.

  • EPSS 0.03%
  • Veröffentlicht 25.05.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:43:25

Incorrect caching of responses to requests including an Authorization header in HAProxy 1.8.0 through 1.8.9 (if cache enabled) allows attackers to achieve information disclosure via an unauthenticated remote request, related to the proto_http.c check...

  • EPSS 25.06%
  • Veröffentlicht 09.05.2018 07:29:00
  • Zuletzt bearbeitet 21.11.2024 03:40:58

An issue was discovered in HAProxy before 1.8.8. The incoming H2 frame length was checked against the max_frame_size setting instead of being checked against the bufsize. The max_frame_size only applies to outgoing traffic and not to incoming, so if ...

  • EPSS 0.01%
  • Veröffentlicht 22.08.2017 18:29:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

HAProxy statistics in openstack-tripleo-image-elements are non-authenticated over the network.