CVE-2012-2942

Published: 27 May 2012

Buffer overflow in the trash buffer in the header capture functionality in HAProxy before 1.4.21, when global.tune.bufsize is set to a value greater than the default and header rewriting is enabled, allows remote attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors.

Priority

Low

Status

Package Release Status
haproxy
Launchpad, Ubuntu, Debian
Upstream
Released (1.4.21)
Patches:
Upstream: http://haproxy.1wt.eu/git?p=haproxy-1.4.git;a=commit;h=30297cb17147a8d339eb160226bcc08c91d9530b
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.