CVE-2019-19330

Name
CVE-2019-19330
Description
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://git.haproxy.org/?p=haproxy-2.0.git;a=commit;h=ac198b92d461515551b95daae20954b3053ce87e
Patch https://git.haproxy.org/?p=haproxy.git;a=commit;h=146f53ae7e97dbfe496d0445c2802dd0a30b0878
Patch https://git.haproxy.org/?p=haproxy.git;a=commit;h=54f53ef7ce4102be596130b44c768d1818570344
Third Party Advisory https://tools.ietf.org/html/rfc7540#section-10.3
Third Party Advisory https://www.debian.org/security/2019/dsa-4577
Mailing List https://seclists.org/bugtraq/2019/Nov/45
Third Party Advisory https://usn.ubuntu.com/4212-1/
GENTOO https://security.gentoo.org/glsa/202004-01

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:haproxy:haproxy:*:*:*:*:*:*:*:* haproxy >= None < 2.0.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status