HAProxy Trash Buffer Overflow Vulnerability

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.

Synopsis :

The remote host is running a load balancer with a buffer overflow

Description :

Based on the self-reported version obtained from the HAProxy
statistics reporting page, the remote host is running load balancing
software that is potentially affected by a buffer overflow
vulnerability when copying data into the trash buffer.

It may be possible for an attacker to exploit this vulnerability to
execute arbitrary code on the remote host, but it requires that the
global.tune.bufsize option is set to a value greater than default and
that header rewriting is configured.

See also :


Solution :

Upgrade to HAProxy version 1.4.21 or higher.

Risk factor :

Medium / CVSS Base Score : 5.1
CVSS Temporal Score : 4.4
Public Exploit Available : false

Family: Misc.

Nessus Plugin ID: 59798 ()

Bugtraq ID: 53647

CVE ID: CVE-2012-2942

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now