CVE Vulnerabilities

CVE-2023-0056

Uncontrolled Resource Consumption

Published: Mar 23, 2023 | Modified: Feb 25, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
4.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Haproxy Haproxy - (including) - (including)
Ceph_storage Redhat 5.0 (including) 5.0 (including)
Software_collections Redhat - (including) - (including)
Red Hat Ceph Storage 5.3 RedHat rhceph/rhceph-haproxy-rhel8:2.2.19-32 *
Red Hat Enterprise Linux 9 RedHat haproxy-0:2.4.17-3.el9_1.2 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat haproxy-0:2.4.7-2.el9_0.2 *
Red Hat OpenShift Container Platform 4.10 RedHat haproxy-0:2.2.19-3.el8 *
Red Hat OpenShift Container Platform 4.11 RedHat haproxy-0:2.2.24-2.el8 *
Red Hat OpenShift Container Platform 4.12 RedHat haproxy-0:2.2.24-2.el8 *
Red Hat OpenShift Container Platform 4.13 RedHat haproxy-0:2.2.24-3.rhaos4.13.el8 *
Red Hat OpenShift Container Platform 4.9 RedHat haproxy-0:2.2.15-6.el8 *
Haproxy Ubuntu devel *
Haproxy Ubuntu esm-infra/focal *
Haproxy Ubuntu focal *
Haproxy Ubuntu jammy *
Haproxy Ubuntu kinetic *
Haproxy Ubuntu trusty *
Haproxy Ubuntu xenial *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References