CVE-2019-19330
Publication date 27 November 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
Status
Package | Ubuntu Release | Status |
---|---|---|
haproxy | ||
18.04 LTS bionic |
Fixed 1.8.8-1ubuntu0.9
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release |
Patch details
Package | Patch details |
---|---|
haproxy |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 · Critical |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4212-1
- HAProxy vulnerability
- 4 December 2019
Other references
- https://git.haproxy.org/?p=haproxy.git;a=commit;h=54f53ef7ce4102be596130b44c768d1818570344
- https://git.haproxy.org/?p=haproxy.git;a=commit;h=146f53ae7e97dbfe496d0445c2802dd0a30b0878
- https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e
- https://tools.ietf.org/html/rfc7540#section-10.3
- https://www.cve.org/CVERecord?id=CVE-2019-19330