Scientific Linux Security Update : haproxy on SL6.x i386/x86_64

This script is Copyright (C) 2013 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A buffer overflow flaw was found in the way HAProxy handled pipelined
HTTP requests. A remote attacker could send pipelined HTTP requests
that would cause HAProxy to crash or, potentially, execute arbitrary
code with the privileges of the user running HAProxy. This issue only
affected systems using all of the following combined configuration
options: HTTP keep alive enabled, HTTP keywords in TCP inspection
rules, and request appending rules. (CVE-2013-1912)

See also :

Solution :

Update the affected haproxy and / or haproxy-debuginfo packages.

Risk factor :

Medium / CVSS Base Score : 5.1

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 66663 ()

Bugtraq ID:

CVE ID: CVE-2013-1912

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now