HAProxy Trash Buffer Overflow Vulnerability

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote host is running a load balancer with a buffer overflow
vulnerability.

Description :

Based on the self-reported version obtained from the HAProxy
statistics reporting page, the remote host is running load balancing
software that is potentially affected by a buffer overflow
vulnerability when copying data into the trash buffer.

It may be possible for an attacker to exploit this vulnerability to
execute arbitrary code on the remote host, but it requires that the
global.tune.bufsize option is set to a value greater than default and
that header rewriting is configured.

See also :

http://haproxy.1wt.eu/download/1.4/src/CHANGELOG

Solution :

Upgrade to HAProxy version 1.4.21 or higher.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 3.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 59798 ()

Bugtraq ID: 53647

CVE ID: CVE-2012-2942