Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://article.gmane.org/gmane.comp.web.haproxy/17726 | exploit mailing list |
http://secunia.com/advisories/61507 | third party advisory |
http://secunia.com/advisories/59936 | third party advisory |
http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commitdiff%3Bh=b4d05093bc89f71377230228007e69a1434c1a0c | |
http://article.gmane.org/gmane.comp.web.haproxy/18097 | mailing list |
http://www.openwall.com/lists/oss-security/2014/09/09/23 | mailing list |
http://rhn.redhat.com/errata/RHSA-2014-1292.html | vendor advisory |