CVE-2019-19330
moderate-risk
Published 2019-11-27
The HTTP/2 implementation in HAProxy before 2.0.10 mishandles headers, as demonstrated by carriage return (CR, ASCII 0xd), line feed (LF, ASCII 0xa), and the zero character (NUL, ASCII 0x0), aka Intermediary Encapsulation Attacks.
Do I need to act?
-
0.96% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: ac198b92d461515551b95daae20954b3053ce87e
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (5)
References (16)
Mailing List
https://seclists.org/bugtraq/2019/Nov/45
Third Party Advisory
https://tools.ietf.org/html/rfc7540#section-10.3
Third Party Advisory
https://usn.ubuntu.com/4212-1/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4577
Mailing List
https://seclists.org/bugtraq/2019/Nov/45
Third Party Advisory
https://tools.ietf.org/html/rfc7540#section-10.3
Third Party Advisory
https://usn.ubuntu.com/4212-1/
Third Party Advisory
https://www.debian.org/security/2019/dsa-4577
47
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
3/34 · Minimal
Exposure
12/34 · Low