Vulnerability Description
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haproxy | Haproxy | <= 1.8.14 |
| Canonical | Ubuntu Linux | 16.04 |
| Redhat | Openshift Container Platform | 3.11 |
Related Weaknesses (CWE)
References
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346
- http://www.securityfocus.com/bid/106223Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0326Third Party Advisory
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/Third Party Advisory
- http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=efbbdf72992cd20458259962346
- http://www.securityfocus.com/bid/106223Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0326Third Party Advisory
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1436
- https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html
- https://usn.ubuntu.com/3858-1/Third Party Advisory
FAQ
What is CVE-2018-20102?
CVE-2018-20102 is a vulnerability with a CVSS score of 7.5 (HIGH). An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 b...
How severe is CVE-2018-20102?
CVE-2018-20102 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20102?
Check the references section above for vendor advisories and patch information. Affected products include: Haproxy Haproxy, Canonical Ubuntu Linux, Redhat Openshift Container Platform.