Vulnerability Description
HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impact via unknown vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 16.04 |
| Haproxy | Haproxy | 1.6.0 |
Related Weaknesses (CWE)
References
- http://git.haproxy.org/?p=haproxy-1.6.git%3Ba=commit%3Bh=60f01f8c89e4fb2723d5a9f
- http://www.openwall.com/lists/oss-security/2016/06/09/5
- http://www.openwall.com/lists/oss-security/2016/06/09/6
- http://www.ubuntu.com/usn/USN-3011-1
- http://git.haproxy.org/?p=haproxy-1.6.git%3Ba=commit%3Bh=60f01f8c89e4fb2723d5a9f
- http://www.openwall.com/lists/oss-security/2016/06/09/5
- http://www.openwall.com/lists/oss-security/2016/06/09/6
- http://www.ubuntu.com/usn/USN-3011-1
FAQ
What is CVE-2016-5360?
CVE-2016-5360 is a vulnerability with a CVSS score of 7.5 (HIGH). HAproxy 1.6.x before 1.6.6, when a deny comes from a reqdeny rule, allows remote attackers to cause a denial of service (uninitialized memory access and crash) or possibly have unspecified other impac...
How severe is CVE-2016-5360?
CVE-2016-5360 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5360?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Haproxy Haproxy.