HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2013-1204.html | third party advisory vendor advisory |
http://marc.info/?l=haproxy&m=137147915029705&w=2 | mailing list third party advisory patch |
http://secunia.com/advisories/54344 | third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=974259 | issue tracking |
http://www.debian.org/security/2013/dsa-2711 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-1120.html | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-1889-1 | third party advisory vendor advisory |