MEDIUM · 6.5

CVE-2023-0056

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious...

Vulnerability Description

An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
NONE
Availability
HIGH

Affected Products

VendorProductVersions
HaproxyHaproxy-
RedhatCeph Storage5.0
RedhatSoftware Collections-
RedhatOpenshift Container Platform4.12
RedhatOpenshift Container Platform For Ibm Linuxone4.12
RedhatOpenshift Container Platform For Power4.12
RedhatOpenshift Container Platform Ibm Z Systems4.12
RedhatEnterprise Linux9.0
FedoraprojectExtra Packages For Enterprise Linux8.0
FedoraprojectFedora36

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-0056?

CVE-2023-0056 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious...

How severe is CVE-2023-0056?

CVE-2023-0056 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-0056?

Check the references section above for vendor advisories and patch information. Affected products include: Haproxy Haproxy, Redhat Ceph Storage, Redhat Software Collections, Redhat Openshift Container Platform, Redhat Openshift Container Platform For Ibm Linuxone.