CVE-2014-6269

Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
haproxyhaproxy
1.5:dev23
haproxyhaproxy
1.5:dev24
haproxyhaproxy
1.5:dev25
haproxyhaproxy
1.5:dev26
haproxyhaproxy
1.5.0
haproxyhaproxy
1.5.1
haproxyhaproxy
1.5.2
haproxyhaproxy
1.5.3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
haproxy
bullseye
2.2.9-2+deb11u6
fixed
bullseye (security)
2.2.9-2+deb11u6
fixed
squeeze
not-affected
bookworm
2.6.12-1+deb12u1
fixed
bookworm (security)
2.6.12-1+deb12u1
fixed
sid
2.9.11-1
fixed
trixie
2.9.11-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
haproxy
trusty
dne
precise
not-affected
lucid
not-affected
Common Weakness Enumeration