Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103794.html | vendor-advisory x_refsource_FEDORA |
| http://rhn.redhat.com/errata/RHSA-2013-0868.html | vendor-advisory x_refsource_REDHAT |
| http://secunia.com/advisories/52725 | third-party-advisory x_refsource_SECUNIA |
| http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103730.html | vendor-advisory x_refsource_FEDORA |
| http://www.debian.org/security/2013/dsa-2711 | vendor-advisory x_refsource_DEBIAN |
| http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103770.html | vendor-advisory x_refsource_FEDORA |
| http://www.securityfocus.com/bid/58820 | vdb-entry x_refsource_BID |
| http://www.ubuntu.com/usn/USN-1800-1 | vendor-advisory x_refsource_UBUNTU |
| http://www.openwall.com/lists/oss-security/2013/04/03/1 | mailing-list x_refsource_MLIST |
| http://rhn.redhat.com/errata/RHSA-2013-0729.html | vendor-advisory x_refsource_REDHAT |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|