CVE-2018-20103
haproxy: Infinite recursion via crafted packet allows stack exhaustion and denial of service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue was discovered in dns.c in HAProxy through 1.8.14. In the case of a compressed pointer, a crafted packet can trigger infinite recursion by making the pointer point to itself, or create a long chain of valid pointers resulting in stack exhaustion.
Se ha descubierto un problema en dns.c en HAProxy hasta la versión 1.8.14. En el caso de un puntero comprimido, un paquete manipulado puede desencadenar una recursión infinita haciendo que el puntero se señale a sí mismo o cree una cadena larga de punteros válidos, lo que resulta en el agotamiento de la pila.
HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include denial of service and information leakage vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-12 CVE Reserved
- 2018-12-12 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
- CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=58df5aea0a0c926b2238f65908f5e9f83d1cca25 | X_refsource_misc | |
http://www.securityfocus.com/bid/106280 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2022/05/msg00045.html | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHBA-2019:0326 | 2023-11-07 | |
https://access.redhat.com/errata/RHBA-2019:0327 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:1436 | 2023-11-07 | |
https://usn.ubuntu.com/3858-1 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2018-20103 | 2019-06-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1658876 | 2019-06-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Haproxy Search vendor "Haproxy" | Haproxy Search vendor "Haproxy" for product "Haproxy" | <= 1.8.14 Search vendor "Haproxy" for product "Haproxy" and version " <= 1.8.14" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openshift Container Platform Search vendor "Redhat" for product "Openshift Container Platform" | 3.11 Search vendor "Redhat" for product "Openshift Container Platform" and version "3.11" | - |
Affected
|