Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2012/05/28/1 | mailing-list x_refsource_MLIST |
| http://security.gentoo.org/glsa/glsa-201301-02.xml | vendor-advisory x_refsource_GENTOO |
| http://www.openwall.com/lists/oss-security/2012/05/23/15 | mailing-list x_refsource_MLIST |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/75777 | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/53647 | vdb-entry x_refsource_BID |
| http://haproxy.1wt.eu/#news | x_refsource_CONFIRM |
| http://www.debian.org/security/2013/dsa-2711 | vendor-advisory x_refsource_DEBIAN |
| http://secunia.com/advisories/49261 | third-party-advisory x_refsource_SECUNIA |
| http://www.ubuntu.com/usn/USN-1800-1 | vendor-advisory x_refsource_UBUNTU |
| http://haproxy.1wt.eu/git?p=haproxy-1.4.git%3Ba=commit%3Bh=30297cb17147a8d339eb160226bcc08c91d9530b | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2012/05/23/12 | mailing-list x_refsource_MLIST |
| http://haproxy.1wt.eu/download/1.4/src/CHANGELOG | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|