Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Haproxy | Haproxy | 1.5-dev23 (including) | 1.5-dev23 (including) |
Haproxy | Haproxy | 1.5-dev24 (including) | 1.5-dev24 (including) |
Haproxy | Haproxy | 1.5-dev25 (including) | 1.5-dev25 (including) |
Haproxy | Haproxy | 1.5-dev26 (including) | 1.5-dev26 (including) |
Haproxy | Haproxy | 1.5.0 (including) | 1.5.0 (including) |
Haproxy | Haproxy | 1.5.1 (including) | 1.5.1 (including) |
Haproxy | Haproxy | 1.5.2 (including) | 1.5.2 (including) |
Haproxy | Haproxy | 1.5.3 (including) | 1.5.3 (including) |
Red Hat Enterprise Linux 7 | RedHat | haproxy-0:1.5.2-3.el7_0 | * |
Haproxy | Ubuntu | upstream | * |