FreeBSD : haproxy -- buffer overflow (617959ce-a5f6-11e1-a284-0023ae8e59f0)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

HAProxy reports :

A flaw was reported in HAProxy where, due to a boundary error when
copying data into the trash buffer, an external attacker could cause a
buffer overflow. Exploiting this flaw could lead to the execution of
arbitrary code, however it requires non-default settings for the
global.tune.bufsize configuration option (must be set to a value
greater than the default), and also that header rewriting is enabled
(via, for example, the regrep or rsprep directives). This flaw is
reported against 1.4.20, prior versions may also be affected.

See also :

http://haproxy.1wt.eu/download/1.4/src/CHANGELOG
http://www.nessus.org/u?a431512a
http://haproxy.1wt.eu/news.html
http://www.nessus.org/u?193e1115

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.1
(CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 59282 ()

Bugtraq ID:

CVE ID: CVE-2012-2942

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now