CVE-2018-20615
Summary
| CVE | CVE-2018-20615 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-03-21 16:00:00 UTC |
| Updated | 2023-11-07 02:56:00 UTC |
| Description | An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame. |
Risk And Classification
Problem Types: CWE-125
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 18.10 | All | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | - | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev0 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev1 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev10 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev11 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev2 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev3 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev4 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev5 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev6 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev7 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev8 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev9 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | - | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev0 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev1 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev10 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev11 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev2 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev3 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev4 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev5 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev6 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev7 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev8 | All | All |
| Application | Haproxy | Haproxy | 1.9.0 | dev9 | All | All |
| Application | Haproxy | Haproxy | All | All | All | All |
| Operating System | Opensuse | Leap | 15.0 | All | All | All |
| Operating System | Opensuse | Leap | 15.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 7.6 | All | All | All |
| Application | Redhat | Openshift Container Platform | 3.11 | All | All | All |
| Application | Redhat | Openshift Container Platform | 3.11 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [ANNOUNCE] haproxy-1.8.17 | www.mail-archive.com | ||
| [security-announce] openSUSE-SU-2019:0166-1: important: Security update | MLIST | lists.opensuse.org | Mailing List, Third Party Advisory |
| [ANNOUNCE] haproxy-1.8.17 | MLIST | www.mail-archive.com | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| USN-3858-1: HAProxy vulnerabilities | Ubuntu security notices | UBUNTU | usn.ubuntu.com | Third Party Advisory |
| HAProxy CVE-2018-20615 Remote Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.