Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2966 HAProxy vulnerability 3 October 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: haproxy Publisher: Ubuntu Operating System: Ubuntu UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2018-14645 Original Bulletin: http://www.ubuntu.com/usn/usn-3780-1 Comment: This advisory references vulnerabilities in products which run on platforms other than Ubuntu. It is recommended that administrators running haproxy check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- USN-3780-1: HAProxy vulnerability 2 October 2018 haproxy vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.04 LTS Summary HAProxy could be made to crash if it received a specially crafted request. Software Description haproxy - fast and reliable load balancing reverse proxy Details It was discovered that HAProxy incorrectly handled certain requests. An attacker could possibly use this issue to cause a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS haproxy - 1.8.8-1ubuntu0.2 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2018-14645 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW7P022aOgq3Tt24GAQgqSg/8CLcrH9Ibc3E541VQLdteQqb56RR1rXoZ WE84HVA4F9yV9JMcLVf85HgaLD/iwFTOdOYLtutB8XMLmw+UAXIiRji+Ijalt4YN Kg91cY35k2MPvgF6FeFGoVwYgHgNUtHXZ9XCCZCpc01jaTLEdz5qWhTiTP4seAq0 TTNUdEtdXSCiBkI1wWh6cpoiD+Hl8CrHnOe77by3u5hgkG6NvRqzjqVF5pT96Yxy TIP+BhGXYTXZYEFDxlpMwKdLIRc8nIbPYHTaKBrizwpSx4vH0erGaVsr8dnn5S90 J1OgEaCoI0R1L+0at2rRgNXTuifE8Yq3yU1n7pctyv3FSqK6R1SCbhDA1QqVh4cX g3IL/OTlPw5uj2XS50QnmPlBIVVeb+Uwq3RbMSl8GqOvxoc4z2qrPpZ3L3pQMIkf HY59sn6e0vtcVDL9gWmgNFU2NKDmXhCdit4CkI3snyq+UMnlKYThTGeN7eB0tlNU 0r6RWzX+31hI1PSd6g8jvmdoo0HLa7qmqBf0Faczpa9XirPfVV0nh/HaiHfdwAfF Upw0l7Q42IGbBQ2ea2viNf4eQFkSem+8TqmIC3pndLS6J8ZOeBg9/ngU+VB0txqI aIbkEreTKqzOCX1VTPJavUQkbmrrOljqVRfq7FPYTD4mVqz7Y16Efpi7SbB0cIRJ LXDJYD22Tvs= =NWYs -----END PGP SIGNATURE-----