CVE-2019-19330
Published: 27 November 2019
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
Priority
Status
Package | Release | Status |
---|---|---|
haproxy
Launchpad, Ubuntu, Debian |
bionic |
Released
(1.8.8-1ubuntu0.9)
|
disco |
Released
(1.8.19-1ubuntu1.3)
|
|
eoan |
Released
(2.0.5-1ubuntu0.3)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(2.0.10-1)
|
|
xenial |
Not vulnerable
|
|
Patches:
upstream: https://git.haproxy.org/?p=haproxy.git;a=commit;h=54f53ef7ce4102be596130b44c768d1818570344 upstream: https://git.haproxy.org/?p=haproxy.git;a=commit;h=146f53ae7e97dbfe496d0445c2802dd0a30b0878 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
- https://git.haproxy.org/?p=haproxy.git;a=commit;h=54f53ef7ce4102be596130b44c768d1818570344
- https://git.haproxy.org/?p=haproxy.git;a=commit;h=146f53ae7e97dbfe496d0445c2802dd0a30b0878
- https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e
- https://tools.ietf.org/html/rfc7540#section-10.3
- https://ubuntu.com/security/notices/USN-4212-1
- https://www.cve.org/CVERecord?id=CVE-2019-19330
- NVD
- Launchpad
- Debian