CVE-2015-3281

The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
Configurations

Configuration 1 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev0:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev1:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev10:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev11:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev12:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev13:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev14:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev15:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev16:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev18:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev19:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev2:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev3:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev4:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev5:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev6:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev7:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev8:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5:dev9:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.10:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.11:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.12:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.5.13:*:*:*:*:*:*:*
cpe:2.3:a:haproxy:haproxy:1.6:dev0:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:linux_enterprise_high_availability_extension:12:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:openstack_cloud:5:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Information

Published : 2015-07-06 15:59

Updated : 2019-06-26 13:49


NVD link : CVE-2015-3281

Mitre link : CVE-2015-3281


JSON object : View

Products Affected

opensuse

  • linux_enterprise_high_availability_extension
  • opensuse
  • openstack_cloud

redhat

  • enterprise_linux_server_tus
  • enterprise_linux_server_eus
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_desktop
  • enterprise_linux_server

haproxy

  • haproxy

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer