Vulnerability CVE-2022-0711


Published: 2022-03-02   Modified: 2022-03-03

Description:
A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.

Type:

CWE-835

(Loop with Unreachable Exit Condition ('Infinite Loop'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Redhat -> Openshift container platform 
Redhat -> Software collections 
Redhat -> Enterprise linux 
Haproxy -> Haproxy 

 References:
https://access.redhat.com/security/cve/cve-2022-0711
https://github.com/haproxy/haproxy/commit/bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8
https://www.mail-archive.com/haproxy@formilux.org/msg41833.html

Copyright 2022, cxsecurity.com

 

Back to Top