Vulnerability Details CVE-2018-20615
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 37.1%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-20615
-
cpe:2.3:a:haproxy:haproxy:1.8.0
-
cpe:2.3:a:haproxy:haproxy:1.8.1
-
cpe:2.3:a:haproxy:haproxy:1.8.10
-
cpe:2.3:a:haproxy:haproxy:1.8.11
-
cpe:2.3:a:haproxy:haproxy:1.8.12
-
cpe:2.3:a:haproxy:haproxy:1.8.13
-
cpe:2.3:a:haproxy:haproxy:1.8.14
-
cpe:2.3:a:haproxy:haproxy:1.8.15
-
cpe:2.3:a:haproxy:haproxy:1.8.16
-
cpe:2.3:a:haproxy:haproxy:1.8.17
-
cpe:2.3:a:haproxy:haproxy:1.8.18
-
cpe:2.3:a:haproxy:haproxy:1.8.19
-
cpe:2.3:a:haproxy:haproxy:1.8.2
-
cpe:2.3:a:haproxy:haproxy:1.8.3
-
cpe:2.3:a:haproxy:haproxy:1.8.4
-
cpe:2.3:a:haproxy:haproxy:1.8.5
-
cpe:2.3:a:haproxy:haproxy:1.8.6
-
cpe:2.3:a:haproxy:haproxy:1.8.7
-
cpe:2.3:a:haproxy:haproxy:1.8.8
-
cpe:2.3:a:haproxy:haproxy:1.8.9
-
cpe:2.3:a:haproxy:haproxy:1.9.0
-
cpe:2.3:a:redhat:openshift_container_platform:3.11
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.04
-
cpe:2.3:o:canonical:ubuntu_linux:18.10
-
cpe:2.3:o:opensuse:leap:15.0
-
cpe:2.3:o:redhat:enterprise_linux:7.0
-
cpe:2.3:o:redhat:enterprise_linux:7.4
-
cpe:2.3:o:redhat:enterprise_linux:7.5
-
cpe:2.3:o:redhat:enterprise_linux:7.6