HAProxy Trash Buffer Overflow Vulnerability

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is running a load balancer with a buffer overflow
vulnerability.

Description :

Based on the self-reported version obtained from the HAProxy
statistics reporting page, the remote host is running load balancing
software that is potentially affected by a buffer overflow
vulnerability when copying data into the trash buffer.

It may be possible for an attacker to exploit this vulnerability to
execute arbitrary code on the remote host, but it requires that the
global.tune.bufsize option is set to a value greater than default and
that header rewriting is configured.

See also :

http://haproxy.1wt.eu/download/1.4/src/CHANGELOG

Solution :

Upgrade to HAProxy version 1.4.21 or higher.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 4.4
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 59798 ()

Bugtraq ID: 53647

CVE ID: CVE-2012-2942

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial