Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.852935
Categoría:SuSE Local Security Checks
Título:openSUSE: Security Advisory for haproxy (openSUSE-SU-2019:2645-1)
Resumen:The remote host is missing an update for the 'haproxy'; package(s) announced via the openSUSE-SU-2019:2645-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'haproxy'
package(s) announced via the openSUSE-SU-2019:2645-1 advisory.

Vulnerability Insight:
This update for haproxy to version 2.0.10 fixes the following issues:

HAProxy was updated to 2.0.10

Security issues fixed:

- CVE-2019-18277: Fixed a potential HTTP smuggling in messages with
transfer-encoding header missing the 'chunked' (bsc#1154980).

- Fixed an improper handling of headers which could have led to injecting
LFs in H2-to-H1 transfers creating new attack space (bsc#1157712)

- Fixed an issue where HEADER frames in idle streams are not rejected and
thus trying to decode them HAPrpxy crashes (bsc#1157714).

Other issue addressed:

- Macro change in the spec file (bsc#1082318)

This update was imported from the SUSE:SLE-15-SP1:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or 'zypper patch'.

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2019-2645=1

Affected Software/OS:
'haproxy' package(s) on openSUSE Leap 15.1.

Solution:
Please install the updated package(s).

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2019-18277
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.