Adsons

    ArchLinux: 201901-15: haproxy: denial of service

    Date27 Jan 2019
    CategoryArchLinux
    609
    Posted ByAnthony Pell
    The package haproxy before version 1.9.0-1 is vulnerable to denial of service.
    Arch Linux Security Advisory ASA-201901-15
    ==========================================
    
    Severity: Medium
    Date    : 2019-01-24
    CVE-ID  : CVE-2018-20102 CVE-2018-20103
    Package : haproxy
    Type    : denial of service
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-836
    
    Summary
    =======
    
    The package haproxy before version 1.9.0-1 is vulnerable to denial of
    service.
    
    Resolution
    ==========
    
    Upgrade to 1.9.0-1.
    
    # pacman -Syu "haproxy>=1.9.0-1"
    
    The problems have been fixed upstream in version 1.9.0.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2018-20102 (denial of service)
    
    A stack-based out-of-bounds read has been found in HAProxy before
    1.8.15, in the dns_validate_dns_response() function in dns.c, where it
    can be triggered by a crafted DNS packet.
    
    - CVE-2018-20103 (denial of service)
    
    A stack-exhaustion issue has been found in HAProxy before 1.8.15, in
    the dns_read_name() function in dns.c, where an infinite recursion can
    be triggered via a crafted DNS packet.
    
    Impact
    ======
    
    A remote attacker is able to crash the server with a specially crafted
    DNS packet.
    
    References
    ==========
    
    https://www.mail-archive.com/This email address is being protected from spambots. You need JavaScript enabled to view it./msg32055.html
    https://git.haproxy.org/?p=haproxy-1.8.git;a=commitdiff;h=2e53fe850be462dab2c1141f044a94d248d68bfe
    https://git.haproxy.org/?p=haproxy-1.8.git;a=commitdiff;h=12e27845513f87fe2df88e5795d0273f0b992a91
    https://git.haproxy.org/?p=haproxy-1.8.git;a=commitdiff;h=2b514b24f71af8ff8c6593636850b9a312a05278
    https://security.archlinux.org/CVE-2018-20102
    https://security.archlinux.org/CVE-2018-20103
    

    Comments powered by CComment

    Sidebar Ad

    LinuxSecurity Poll

    Does your company/organization utilize open-source software?

    Message!

    Poll results are hidden from public viewing.

    You are not authorized to vote on this poll.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    5
    radio
    bottom200