CentOS 6 / 7 : haproxy (CESA-2015:1741)

medium Nessus Plugin ID 86509

Synopsis

The remote CentOS host is missing a security update.

Description

An updated haproxy package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7.

Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

HAProxy provides high availability, load balancing, and proxying for TCP and HTTP-based applications.

An implementation error related to the memory management of requests and responses was found within HAProxy's buffer_slow_realign() function. An unauthenticated remote attacker could possibly use this flaw to leak certain memory buffer contents from a past request or session. (CVE-2015-3281)

All haproxy users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Solution

Update the affected haproxy package.

See Also

http://www.nessus.org/u?dab7cb4a

http://www.nessus.org/u?d3d952da

Plugin Details

Severity: Medium

ID: 86509

File Name: centos_RHSA-2015-1741.nasl

Version: 2.10

Type: local

Agent: unix

Published: 10/22/2015

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-3281

Vulnerability Information

CPE: p-cpe:/a:centos:centos:haproxy, cpe:/o:centos:centos:6, cpe:/o:centos:centos:7

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/8/2015

Vulnerability Publication Date: 7/6/2015

Reference Information

CVE: CVE-2015-3281

RHSA: 2015:1741