Vulnerability Description
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Haproxy | Haproxy | >= 1.8.0, <= 1.8.19 |
| Opensuse | Leap | 15.0 |
| Canonical | Ubuntu Linux | 16.04 |
| Redhat | Openshift Container Platform | 3.11 |
| Redhat | Enterprise Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/106645Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0275Third Party Advisory
- https://usn.ubuntu.com/3858-1/Third Party Advisory
- https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00018.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/106645Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHBA-2019:0327Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0275Third Party Advisory
- https://usn.ubuntu.com/3858-1/Third Party Advisory
- https://www.mail-archive.com/haproxy%40formilux.org/msg32304.html
FAQ
What is CVE-2018-20615?
CVE-2018-20615 is a vulnerability with a CVSS score of 7.5 (HIGH). An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame r...
How severe is CVE-2018-20615?
CVE-2018-20615 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20615?
Check the references section above for vendor advisories and patch information. Affected products include: Haproxy Haproxy, Opensuse Leap, Canonical Ubuntu Linux, Redhat Openshift Container Platform, Redhat Enterprise Linux.