René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

454 lines
16 KiB
JSON

{
"id": "CVE-2015-3281",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-07-06T15:59:06.167",
"lastModified": "2023-02-13T00:49:40.197",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request."
},
{
"lang": "es",
"value": "La funci\u00f3n buffer_slow_realign en HAProxy 1.5.x anterior a 1.5.14 y 1.6-dev no realinea correctamente un buffer que es utilizado para datos salientes pendientes, lo que permite a atacantes remotos obtener informaci\u00f3n sensible (contenidos de memoria no inicializada de solicitudes previas) a trav\u00e9s de una solicitud manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*",
"matchCriteriaId": "AFA5BE61-7877-4A2C-8135-3F624569874D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*",
"matchCriteriaId": "CD467A6D-295A-42DC-A0F7-5498FC95654B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*",
"matchCriteriaId": "D96B78BA-2412-4E8D-9F4A-3A4480A8EF75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*",
"matchCriteriaId": "CAA641FA-60FF-4B43-8D2E-C42DEC79562D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*",
"matchCriteriaId": "007F99A6-7FAD-4692-AF4A-E9919BA10EDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*",
"matchCriteriaId": "06399F03-93C5-4882-8E8A-88712E6A3F29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*",
"matchCriteriaId": "B7B74CB1-63EF-4019-8AB5-96A1E8D2990D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*",
"matchCriteriaId": "5E08838E-DF28-425E-8440-B7CEC1A910CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*",
"matchCriteriaId": "9D3436E0-CB58-4531-985B-FB90A991A7FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*",
"matchCriteriaId": "183F43A3-71DC-479C-8197-17D374FAA421"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*",
"matchCriteriaId": "352015C3-B8CC-4397-86CF-446ADB415054"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*",
"matchCriteriaId": "76009FEA-17FD-4218-85C7-4EAC3FC008D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev19:*:*:*:*:*:*",
"matchCriteriaId": "75896B9E-7D14-48A5-A6EE-743BA1C3F6F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*",
"matchCriteriaId": "04150D4D-49DF-4D51-8A0C-C1C74B024C1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*",
"matchCriteriaId": "599A5CCE-7DDA-4AF5-8E10-85F6E0677CF4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*",
"matchCriteriaId": "AC3C72A9-1958-42EA-B387-D52183541925"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*",
"matchCriteriaId": "CF86C16E-08F1-4C8A-AA63-288EAE7D49E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*",
"matchCriteriaId": "A9A44D0A-1104-4417-AEEF-07469D7F5BBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*",
"matchCriteriaId": "EBA058C9-0FBD-44E7-9916-A59823351193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*",
"matchCriteriaId": "24367FAF-BC8B-45B7-9938-DE4A3EC289AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*",
"matchCriteriaId": "599CB200-80B0-4BE3-916B-C02165F718F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A8346999-B3EE-4BBA-ABEA-F9D07017EBAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD95164-7653-4433-97AB-8D0BA0B89828"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2EA9FE-BCD8-483D-91B2-FCDD096E9F68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF8DB5D-B3DC-4EAC-A3A7-06846615980A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD4D155-8308-4C56-9DC9-7350C4194C22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7D34DF90-6C92-416C-8ACB-CBA3B2C70681"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A97FE8DC-B6CF-40A2-930F-28735D31077E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE68254-3D29-4A81-9C53-DF8B607EE35E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0E32C0-5AE6-4FFD-934E-B8073F1508F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5BD56C71-A400-43BB-A38A-707F9042FCA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4E50BB83-244C-4A4E-898D-6128A32B81D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "39E49693-4162-45BD-98D6-9831E6E170B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4977E9EA-8F9D-4176-B928-C501D3C5260A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "3A064420-E3C5-4E40-853E-10FE2A93D16A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:haproxy:haproxy:1.6:dev0:*:*:*:*:*:*",
"matchCriteriaId": "3F961D45-9983-464A-9C20-BE8022AAEC07"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"matchCriteriaId": "49A63F39-30BE-443F-AF10-6245587D3359"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:linux_enterprise_high_availability_extension:12:*:*:*:*:*:*:*",
"matchCriteriaId": "5BA01485-1F8F-4FA2-BFC6-7400711CAF84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:openstack_cloud:5:*:*:*:*:*:*:*",
"matchCriteriaId": "A70EF794-432D-413D-A9B8-4875E8DE2B6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8CD4EF-DC90-40BB-A721-6EC087507906"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"
}
]
}
]
}
],
"references": [
{
"url": "http://git.haproxy.org/?p=haproxy-1.5.git%3Ba=commit%3Bh=7ec765568883b2d4e5a2796adbeb492a22ec9bd4",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00001.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00023.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1741.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-2666.html",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.debian.org/security/2015/dsa-3301",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.haproxy.org/news.html",
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/75554",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.ubuntu.com/usn/USN-2668-1",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}