The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4577-1 | haproxy security update |
EUVD |
EUVD-2019-8951 | The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks. |
Ubuntu USN |
USN-4212-1 | HAProxy vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T02:16:46.867Z
Reserved: 2019-11-27T00:00:00
Link: CVE-2019-19330
No data.
Status : Modified
Published: 2019-11-27T16:15:11.720
Modified: 2024-11-21T04:34:35.250
Link: CVE-2019-19330
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN