A flaw was found in the way HAProxy processed HTTP responses containing the "Set-Cookie2" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.
2022-03-02T22:15:08.313
2024-11-21T06:39:14.313
Modified
CVSSv3.1: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | haproxy | haproxy | < 2.2.21 | Yes |
Application | haproxy | haproxy | < 2.3.18 | Yes |
Application | haproxy | haproxy | < 2.4.13 | Yes |
Application | redhat | openshift_container_platform | 4.0 | Yes |
Application | redhat | software_collections | - | Yes |
Operating System | redhat | enterprise_linux | 7.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 11.0 | Yes |