CVE-2015-3281
Published Jul 6, 2015
Last updated 6 months ago
Overview
- Description
- The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFA5BE61-7877-4A2C-8135-3F624569874D" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD467A6D-295A-42DC-A0F7-5498FC95654B" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D96B78BA-2412-4E8D-9F4A-3A4480A8EF75" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAA641FA-60FF-4B43-8D2E-C42DEC79562D" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "007F99A6-7FAD-4692-AF4A-E9919BA10EDE" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06399F03-93C5-4882-8E8A-88712E6A3F29" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7B74CB1-63EF-4019-8AB5-96A1E8D2990D" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E08838E-DF28-425E-8440-B7CEC1A910CE" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D3436E0-CB58-4531-985B-FB90A991A7FC" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "183F43A3-71DC-479C-8197-17D374FAA421" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "352015C3-B8CC-4397-86CF-446ADB415054" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76009FEA-17FD-4218-85C7-4EAC3FC008D9" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev19:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75896B9E-7D14-48A5-A6EE-743BA1C3F6F1" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04150D4D-49DF-4D51-8A0C-C1C74B024C1B" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "599A5CCE-7DDA-4AF5-8E10-85F6E0677CF4" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC3C72A9-1958-42EA-B387-D52183541925" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF86C16E-08F1-4C8A-AA63-288EAE7D49E3" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9A44D0A-1104-4417-AEEF-07469D7F5BBF" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBA058C9-0FBD-44E7-9916-A59823351193" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24367FAF-BC8B-45B7-9938-DE4A3EC289AB" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "599CB200-80B0-4BE3-916B-C02165F718F6" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8346999-B3EE-4BBA-ABEA-F9D07017EBAC" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DD95164-7653-4433-97AB-8D0BA0B89828" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA2EA9FE-BCD8-483D-91B2-FCDD096E9F68" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBF8DB5D-B3DC-4EAC-A3A7-06846615980A" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFD4D155-8308-4C56-9DC9-7350C4194C22" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D34DF90-6C92-416C-8ACB-CBA3B2C70681" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A97FE8DC-B6CF-40A2-930F-28735D31077E" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3AE68254-3D29-4A81-9C53-DF8B607EE35E" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D0E32C0-5AE6-4FFD-934E-B8073F1508F7" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BD56C71-A400-43BB-A38A-707F9042FCA3" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E50BB83-244C-4A4E-898D-6128A32B81D4" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39E49693-4162-45BD-98D6-9831E6E170B0" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4977E9EA-8F9D-4176-B928-C501D3C5260A" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A064420-E3C5-4E40-853E-10FE2A93D16A" }, { "criteria": "cpe:2.3:a:haproxy:haproxy:1.6:dev0:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3F961D45-9983-464A-9C20-BE8022AAEC07" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:openstack_cloud:5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A70EF794-432D-413D-A9B8-4875E8DE2B6E" }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "057121A7-3FF7-45DA-AEBD-A97F050B85B2" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E8CD4EF-DC90-40BB-A721-6EC087507906" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97" } ], "operator": "OR" } ] } ]