CVE-2013-2175
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
19/08/2013
Last modified:
11/04/2025
Description
HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:enterprise_linux_load_balancer:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:enterprise_linux_load_balancer:6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:haproxy:haproxy:1.4.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=haproxy&m=137147915029705&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1120.html
- http://rhn.redhat.com/errata/RHSA-2013-1204.html
- http://secunia.com/advisories/54344
- http://www.debian.org/security/2013/dsa-2711
- http://www.ubuntu.com/usn/USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259
- http://marc.info/?l=haproxy&m=137147915029705&w=2
- http://rhn.redhat.com/errata/RHSA-2013-1120.html
- http://rhn.redhat.com/errata/RHSA-2013-1204.html
- http://secunia.com/advisories/54344
- http://www.debian.org/security/2013/dsa-2711
- http://www.ubuntu.com/usn/USN-1889-1
- https://bugzilla.redhat.com/show_bug.cgi?id=974259



