HAProxy: Arbitrary code execution — GLSA 201301-02

A buffer overflow in HAProxy may allow execution of arbitrary code.

Affected packages

net-proxy/haproxy on all architectures
Affected versions < 1.4.21
Unaffected versions >= 1.4.21

Background

HAProxy is a TCP/HTTP reverse proxy for high availability environments.

Description

A boundary error in HAProxy could cause a buffer overflow when header rewriting is enabled and the configuration sets global.tune.bufsize to a value greater than the default (16384 bytes).

Impact

A remote attacker could possibly execute arbitrary code with the privileges of the process or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All HAProxy users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/haproxy-1.4.21"
 

References

Release date
January 08, 2013

Latest revision
January 08, 2013: 1

Severity
high

Exploitable
remote

Bugzilla entries