Bug 1658874 (CVE-2018-20102) - CVE-2018-20102 haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response() allows for memory disclosure
Summary: CVE-2018-20102 haproxy: Out-of-bounds read in dns.c:dns_validate_dns_response...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-20102
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1658882 1659016 1659017 1660104 1660105 1660106 1660107
Blocks: 1658879
TreeView+ depends on / blocked
 
Reported: 2018-12-13 04:58 UTC by Sam Fowler
Modified: 2021-02-16 22:39 UTC (History)
20 users (show)

Fixed In Version: haproxy 1.8.15
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-07-12 13:06:23 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:1436 0 None None None 2019-06-11 12:01:32 UTC

Description Sam Fowler 2018-12-13 04:58:10 UTC
An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.


Upstream Patch:

http://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72

Comment 1 Sam Fowler 2018-12-13 05:15:13 UTC
Created haproxy tracking bugs for this issue:

Affects: fedora-all [bug 1658882]

Comment 2 Sam Fowler 2018-12-13 05:34:29 UTC
External Reference:

https://www.mail-archive.com/haproxy@formilux.org/msg32055.html

Comment 3 Stefan Cornelius 2018-12-13 11:00:41 UTC
Statement:

This issue did not affect the versions of haproxy as shipped with Red Hat Enterprise Linux 6 and 7.

Comment 6 errata-xmlrpc 2019-06-11 12:01:30 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS

Via RHSA-2019:1436 https://access.redhat.com/errata/RHSA-2019:1436

Comment 7 Product Security DevOps Team 2019-07-12 13:06:23 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-20102


Note You need to log in before you can comment on or make changes to this bug.