CVE-2014-6269

NameCVE-2014-6269
DescriptionMultiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
haproxy (PTS)jessie1.5.8-3+deb8u2fixed
jessie (security)1.5.8-3+deb8u1fixed
stretch1.7.5-2fixed
buster1.8.19-1fixed
buster (security)1.8.19-1+deb10u1fixed
bullseye, sid2.0.12-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
haproxysource(unstable)1.5.4-1
haproxysourcesqueeze(not affected)

Notes

[squeeze] - haproxy <not-affected> (Vulnerable code not present)
http://article.gmane.org/gmane.comp.web.haproxy/17726
http://article.gmane.org/gmane.comp.web.haproxy/18097
http://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c

Search for package or bug name: Reporting problems