HAProxy 1.4 before 1.4.24 and 1.5 before 1.5-dev19, when configured to use hdr_ip or other "hdr_*" functions with a negative occurrence count, allows remote attackers to cause a denial of service (negative array index usage and crash) via an HTTP header with a certain number of values, related to the MAX_HDR_HISTORY variable.
                
            References
                    | Link | Resource | 
|---|---|
| http://marc.info/?l=haproxy&m=137147915029705&w=2 | Patch Third Party Advisory | 
| http://rhn.redhat.com/errata/RHSA-2013-1120.html | Third Party Advisory | 
| http://rhn.redhat.com/errata/RHSA-2013-1204.html | Third Party Advisory | 
| http://secunia.com/advisories/54344 | |
| http://www.debian.org/security/2013/dsa-2711 | Third Party Advisory | 
| http://www.ubuntu.com/usn/USN-1889-1 | Third Party Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=974259 | Issue Tracking | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2013-08-19 13:07
Updated : 2016-12-07 23:43
NVD link : CVE-2013-2175
Mitre link : CVE-2013-2175
CVE.ORG link : CVE-2013-2175
JSON object : View
Products Affected
                haproxy
- haproxy
debian
- debian_linux
canonical
- ubuntu_linux
redhat
- enterprise_linux_load_balancer
