Unrated severityNVD Advisory· Published Apr 10, 2013· Updated Apr 29, 2026
CVE-2013-1912
CVE-2013-1912
Description
Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.
Affected products
5cpe:2.3:a:haproxy:haproxy:1.4:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:haproxy:haproxy:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.4.20:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.4.22:*:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev:*:*:*:*:*:*
- cpe:2.3:a:haproxy:haproxy:1.5:dev17:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- rhn.redhat.com/errata/RHSA-2013-0729.htmlnvdVendor Advisory
- secunia.com/advisories/52725nvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2013-April/103730.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2013-April/103770.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2013-April/103794.htmlnvd
- rhn.redhat.com/errata/RHSA-2013-0868.htmlnvd
- www.debian.org/security/2013/dsa-2711nvd
- www.openwall.com/lists/oss-security/2013/04/03/1nvd
- www.securityfocus.com/bid/58820nvd
- www.ubuntu.com/usn/USN-1800-1nvd
News mentions
0No linked articles in our index yet.