idx
int64
project
string
commit_id
string
project_url
string
commit_url
string
commit_message
string
target
int64
func
string
func_hash
float64
file_name
string
file_hash
float64
cwe
list
cve
string
cve_desc
string
nvd_url
string
16,520
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
parse_register_dst( struct translate_ctx *ctx, uint *file, struct parsed_bracket *brackets) { brackets->ind_comp = TGSI_SWIZZLE_X; if (!parse_register_file_bracket( ctx, file )) return FALSE; if (!parse_register_bracket( ctx, brackets )) return FALSE; return TRUE; }
306,072,997,943,435,300,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,521
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
parse_register_file_bracket( struct translate_ctx *ctx, uint *file ) { if (!parse_file( &ctx->cur, file )) { report_error( ctx, "Unknown register file" ); return FALSE; } eat_opt_white( &ctx->cur ); if (*ctx->cur != '[') { report_error( ctx, "Expected `['" ); return FALSE; }...
225,920,943,564,887,520,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,522
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
parse_src_operand( struct translate_ctx *ctx, struct tgsi_full_src_register *src ) { uint file; uint swizzle[4]; boolean parsed_swizzle; struct parsed_bracket bracket[2]; int parsed_opt_brackets; if (*ctx->cur == '-') { ctx->cur++; eat_opt_white( &ctx->cur ); src->Register.Neg...
214,108,191,393,218,550,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,523
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
parse_texoffset_operand( struct translate_ctx *ctx, struct tgsi_texture_offset *src ) { uint file; uint swizzle[3]; boolean parsed_swizzle; struct parsed_bracket bracket; if (!parse_register_src(ctx, &file, &bracket)) return FALSE; src->File = file; src->Index = bracket.index; /* ...
243,719,028,480,469,100,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,524
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
static void report_error(struct translate_ctx *ctx, const char *format, ...) { va_list args; int line = 1; int column = 1; const char *itr = ctx->text; debug_printf("\nTGSI asm error: "); va_start(args, format); _debug_vprintf(format, args); va_end(args); while (itr != ctx->cur) { if...
5,833,547,282,051,635,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,525
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
tgsi_text_translate( const char *text, struct tgsi_token *tokens, uint num_tokens ) { struct translate_ctx ctx = {0}; ctx.text = text; ctx.cur = text; ctx.tokens = tokens; ctx.tokens_cur = tokens; ctx.tokens_end = tokens + num_tokens; if (!translate( &ctx )) return FALSE; retur...
238,022,307,771,255,280,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,526
virglrenderer
28894a30a17a84529be102b21118e55d6c9f23fa
https://gitlab.freedesktop.org/virgl/virglrenderer
https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
gallium/tgsi: fix oob access in parse instruction When parsing texture instruction, it doesn't stop if the 'cur' is ',', the loop variable 'i' will also be increased and be used to index the 'inst.TexOffsets' array. This can lead an oob access issue. This patch avoid this. Signed-off-by: Li Qiang <liq3ea@gmail.com> S...
0
static boolean translate( struct translate_ctx *ctx ) { eat_opt_white( &ctx->cur ); if (!parse_header( ctx )) return FALSE; if (ctx->processor == TGSI_PROCESSOR_TESS_CTRL || ctx->processor == TGSI_PROCESSOR_TESS_EVAL) ctx->implied_array_size = 32; while (*ctx->cur != '\0') { uint...
254,006,993,480,805,400,000,000,000,000,000,000,000
tgsi_text.c
168,133,196,584,781,830,000,000,000,000,000,000,000
[ "CWE-119" ]
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
https://nvd.nist.gov/vuln/detail/CVE-2017-5580
16,527
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void __http_protocol_init(void) { acl_register_keywords(&acl_kws); sample_register_fetches(&sample_fetch_keywords); sample_register_convs(&sample_conv_kws); }
99,361,912,543,221,010,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,528
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct http_req_action_kw *action_http_req_custom(const char *kw) { if (!LIST_ISEMPTY(&http_req_keywords.list)) { struct http_req_action_kw_list *kw_list; int i; list_for_each_entry(kw_list, &http_req_keywords.list, list) { for (i = 0; kw_list->kw[i].kw != NULL; i++) { if (!strcmp(kw, kw_list->kw[i].kw))...
338,732,020,618,634,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,529
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct http_res_action_kw *action_http_res_custom(const char *kw) { if (!LIST_ISEMPTY(&http_res_keywords.list)) { struct http_res_action_kw_list *kw_list; int i; list_for_each_entry(kw_list, &http_res_keywords.list, list) { for (i = 0; kw_list->kw[i].kw != NULL; i++) { if (!strcmp(kw, kw_list->kw[i].kw))...
42,297,187,404,441,932,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,530
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filter_to_req_headers(struct session *s, struct channel *req, struct hdr_exp *exp) { char *cur_ptr, *cur_end, *cur_next; int cur_idx, old_idx, last_hdr; struct http_txn *txn = &s->txn; struct hdr_idx_elem *cur_hdr; int delta; last_hdr = 0; cur_next = req->buf->p + hdr_idx_first_pos(&txn->hdr_idx); o...
185,481,058,285,179,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,531
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filter_to_req_line(struct session *s, struct channel *req, struct hdr_exp *exp) { char *cur_ptr, *cur_end; int done; struct http_txn *txn = &s->txn; int delta; if (unlikely(txn->flags & (TX_CLDENY | TX_CLTARPIT))) return 1; else if (unlikely(txn->flags & TX_CLALLOW) && (exp->action == ACT_ALLOW ||...
253,239,459,688,155,570,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,532
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filter_to_resp_headers(struct session *s, struct channel *rtr, struct hdr_exp *exp) { char *cur_ptr, *cur_end, *cur_next; int cur_idx, old_idx, last_hdr; struct http_txn *txn = &s->txn; struct hdr_idx_elem *cur_hdr; int delta; last_hdr = 0; cur_next = rtr->buf->p + hdr_idx_first_pos(&txn->hdr_idx); ...
44,014,739,518,182,140,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,533
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filter_to_sts_line(struct session *s, struct channel *rtr, struct hdr_exp *exp) { char *cur_ptr, *cur_end; int done; struct http_txn *txn = &s->txn; int delta; if (unlikely(txn->flags & TX_SVDENY)) return 1; else if (unlikely(txn->flags & TX_SVALLOW) && (exp->action == ACT_ALLOW || exp->actio...
42,509,404,027,713,416,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,534
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filters_to_request(struct session *s, struct channel *req, struct proxy *px) { struct http_txn *txn = &s->txn; struct hdr_exp *exp; for (exp = px->req_exp; exp; exp = exp->next) { int ret; /* * The interleaving of transformations and verdicts * makes it difficult to decide to continue or stop ...
160,757,118,170,511,910,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,535
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int apply_filters_to_response(struct session *s, struct channel *rtr, struct proxy *px) { struct http_txn *txn = &s->txn; struct hdr_exp *exp; for (exp = px->rsp_exp; exp; exp = exp->next) { int ret; /* * The interleaving of transformations and verdicts * makes it difficult to decide to continue or stop ...
261,474,401,664,575,550,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,536
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void capture_headers(char *som, struct hdr_idx *idx, char **cap, struct cap_hdr *cap_hdr) { char *eol, *sol, *col, *sov; int cur_idx; struct cap_hdr *h; int len; sol = som + hdr_idx_first_pos(idx); cur_idx = hdr_idx_first_idx(idx); while (cur_idx) { eol = sol + idx->v[cur_idx].len; col = sol; whi...
83,246,215,871,680,480,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,537
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void check_response_for_cacheability(struct session *s, struct channel *rtr) { struct http_txn *txn = &s->txn; char *p1, *p2; char *cur_ptr, *cur_end, *cur_next; int cur_idx; if (!(txn->flags & TX_CACHEABLE)) return; /* Iterate through the headers. * we start with the start line. */ cur_idx = 0; cur_ne...
311,376,294,844,566,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,538
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void debug_hdr(const char *dir, struct session *s, const char *start, const char *end) { int max; chunk_printf(&trash, "%08x:%s.%s[%04x:%04x]: ", s->uniq_id, s->be->id, dir, objt_conn(s->req->prod->end) ? (unsigned short)objt_conn(s->req->prod->end)->t.sock.fd : -1, objt_conn(s->req->cons->end) ...
248,484,807,811,282,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,539
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int del_hdr_value(struct buffer *buf, char **from, char *next) { char *prev = *from; if (*prev == ':') { /* We're removing the first value, preserve the colon and add a * space if possible. */ if (!http_is_crlf[(unsigned char)*next]) next++; prev++; if (prev < next) *prev++ = ' '; while (http_...
300,391,477,553,413,670,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,540
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
char *find_hdr_value_end(char *s, const char *e) { int quoted, qdpair; quoted = qdpair = 0; for (; s < e; s++) { if (qdpair) qdpair = 0; else if (quoted) { if (*s == '\\') qdpair = 1; else if (*s == '"') quoted = 0; } else if (*s == '"') quoted = 1; else if (*...
252,875,682,523,262,000,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,541
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
enum http_meth_t find_http_meth(const char *str, const int len) { unsigned char m; const struct http_method_desc *h; m = ((unsigned)*str - 'A'); if (m < 26) { for (h = http_methods[m]; h->len > 0; h++) { if (unlikely(h->len != len)) continue; if (likely(memcmp(str, h->text, h->len) == 0)) return h...
242,046,979,802,218,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,542
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
find_url_param_pos(char* query_string, size_t query_string_l, char* url_param_name, size_t url_param_name_l, char delim) { char *pos, *last; pos = query_string; last = query_string + query_string_l - url_param_name_l - 1; while (pos <= last) { if (pos[url_param_name_l] == ...
297,717,029,568,004,160,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,543
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
find_url_param_value(char* path, size_t path_l, char* url_param_name, size_t url_param_name_l, char** value, int* value_l, char delim) { char *query_string, *qs_end; char *arg_start; char *value_start, *value_end; query_string = find_param_list(path, path_l, delim); if (!...
141,947,099,464,080,880,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,544
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void free_http_res_rules(struct list *r) { struct http_res_rule *tr, *pr; list_for_each_entry_safe(pr, tr, r, list) { LIST_DEL(&pr->list); regex_free(&pr->arg.hdr_add.re); free(pr); } }
266,449,377,537,107,560,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,545
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
get_http_auth(struct session *s) { struct http_txn *txn = &s->txn; struct chunk auth_method; struct hdr_ctx ctx; char *h, *p; int len; #ifdef DEBUG_AUTH printf("Auth for session %p: %d\n", s, txn->auth.method); #endif if (txn->auth.method == HTTP_AUTH_WRONG) return 0; txn->auth.method = HTTP_AUTH_WRONG; ...
81,905,410,338,033,360,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,546
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void get_srv_from_appsession(struct session *s, const char *begin, int len) { char *end_params, *first_param, *cur_param, *next_param; char separator; int value_len; int mode = s->be->options2 & PR_O2_AS_M_ANY; if (s->be->appsession_name == NULL || (s->txn.meth != HTTP_METH_GET && s->txn.meth != HTTP_METH_P...
86,967,224,149,535,440,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,547
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_capture_bad_message(struct error_snapshot *es, struct session *s, struct http_msg *msg, enum ht_state state, struct proxy *other_end) { struct channel *chn = msg->chn; int len1, len2; es->len = MIN(chn->buf->i, sizeof(es->buf)); len1 = chn->buf->data + chn->buf->siz...
166,547,117,145,294,220,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,548
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_end_txn(struct session *s) { struct http_txn *txn = &s->txn; /* release any possible compression context */ if (s->flags & SN_COMP_READY) s->comp_algo->end(&s->comp_ctx); s->comp_algo = NULL; s->flags &= ~SN_COMP_READY; /* these ones will have been dynamically allocated */ pool_free2(pool2_requri, ...
285,323,966,760,057,680,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,549
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct chunk *http_error_message(struct session *s, int msgnum) { if (s->be->errmsg[msgnum].str) return &s->be->errmsg[msgnum]; else if (s->fe->errmsg[msgnum].str) return &s->fe->errmsg[msgnum]; else return &http_err_chunks[msgnum]; }
63,633,971,552,618,490,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,550
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_find_full_header2(const char *name, int len, char *sol, struct hdr_idx *idx, struct hdr_ctx *ctx) { char *eol, *sov; int cur_idx, old_idx; cur_idx = ctx->idx; if (cur_idx) { /* We have previously returned a header, let's search another one */ sol =...
112,832,169,482,043,920,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,551
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int http_forward_trailers(struct http_msg *msg) { const struct buffer *buf = msg->chn->buf; /* we have msg->next which points to next line. Look for CRLF. */ while (1) { const char *p1 = NULL, *p2 = NULL; const char *ptr = b_ptr(buf, msg->next); const char *stop = bi_end(buf); int bytes; /* scan c...
132,306,053,799,624,530,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,552
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
unsigned int http_get_fhdr(const struct http_msg *msg, const char *hname, int hlen, struct hdr_idx *idx, int occ, struct hdr_ctx *ctx, char **vptr, int *vlen) { struct hdr_ctx local_ctx; char *ptr_hist[MAX_HDR_HISTORY]; int len_hist[MAX_HDR_HISTORY]; unsigned int hist_ptr; int found; if (!ctx) { lo...
301,242,714,111,893,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,553
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
http_get_path(struct http_txn *txn) { char *ptr, *end; ptr = txn->req.chn->buf->p + txn->req.sl.rq.u; end = ptr + txn->req.sl.rq.u_l; if (ptr >= end) return NULL; /* RFC2616, par. 5.1.2 : * Request-URI = "*" | absuri | abspath | authority */ if (*ptr == '*') return NULL; if (isalpha((unsigned char)*...
126,323,269,027,920,690,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,554
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_handle_stats(struct session *s, struct channel *req) { struct stats_admin_rule *stats_admin_rule; struct stream_interface *si = s->rep->prod; struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->req; struct uri_auth *uri_auth = s->be->uri_auth; const char *uri, *h, *lookup; struct appctx *appctx...
81,706,940,845,112,490,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,555
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_init_txn(struct session *s) { struct http_txn *txn = &s->txn; struct proxy *fe = s->fe; txn->flags = 0; txn->status = -1; txn->cookie_first_date = 0; txn->cookie_last_date = 0; txn->req.flags = 0; txn->req.sol = txn->req.eol = txn->req.eoh = 0; /* relative to the buffer */ txn->req.next = 0; txn-...
338,918,622,383,095,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,556
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_msg_analyzer(struct http_msg *msg, struct hdr_idx *idx) { enum ht_state state; /* updated only when leaving the FSM */ register char *ptr, *end; /* request pointers, to avoid dereferences */ struct buffer *buf; state = msg->msg_state; buf = msg->chn->buf; ptr = buf->p + msg->next; end = buf->p +...
117,152,213,604,388,630,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,557
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static inline int http_parse_chunk_size(struct http_msg *msg) { const struct buffer *buf = msg->chn->buf; const char *ptr = b_ptr(buf, msg->next); const char *ptr_old = ptr; const char *end = buf->data + buf->size; const char *stop = bi_end(buf); unsigned int chunk = 0; /* The chunk size is in the following for...
199,060,767,540,893,400,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,558
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, struct proxy *curproxy, const char **args, char **errmsg, int use_fmt) { struct redirect_rule *rule; int cur_arg; int type = REDIRECT_TYPE_NONE; int code = 302; const char *destination = NUL...
52,540,437,647,124,615,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,559
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
const char *http_parse_reqline(struct http_msg *msg, enum ht_state state, const char *ptr, const char *end, unsigned int *ret_ptr, enum ht_state *ret_state) { const char *msg_start = msg->chn->buf->p; switch (state) { case HTTP_MSG_RQMETH: http_msg_rqmeth: if (likely(HTTP_IS_TOKEN(*ptr))) ...
155,530,337,877,724,650,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,560
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_perform_server_redirect(struct session *s, struct stream_interface *si) { struct http_txn *txn; struct server *srv; char *path; int len, rewind; /* 1: create the response header */ trash.len = strlen(HTTP_302); memcpy(trash.str, HTTP_302, trash.len); srv = objt_server(s->target); /* 2: add the ser...
48,346,802,732,632,120,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,561
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_process_req_common(struct session *s, struct channel *req, int an_bit, struct proxy *px) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->req; struct redirect_rule *rule; struct cond_wordlist *wl; enum rule_result verdict; if (unlikely(msg->msg_state < HTTP_MSG_BODY)) { /* we need more d...
195,495,444,431,836,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,562
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_process_request(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->req; struct connection *cli_conn = objt_conn(req->prod->end); if (unlikely(msg->msg_state < HTTP_MSG_BODY)) { /* we need more data */ channel_dont_connect(req); return 0...
259,864,841,308,953,970,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,563
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_process_res_common(struct session *s, struct channel *rep, int an_bit, struct proxy *px) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->rsp; struct proxy *cur_proxy; struct cond_wordlist *wl; struct http_res_rule *http_res_last_rule = NULL; DPRINTF(stderr,"[%u] %s: session=%p b=%p, exp(r...
60,269,700,043,439,240,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,564
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_process_tarpit(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; /* This connection is being tarpitted. The CLIENT side has * already set the connect expiration date to the right * timeout. We just have to check that the client is still * there and that the timeout ...
59,963,824,292,249,020,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,565
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_remove_header2(struct http_msg *msg, struct hdr_idx *idx, struct hdr_ctx *ctx) { int cur_idx = ctx->idx; char *sol = ctx->line; struct hdr_idx_elem *hdr; int delta, skip_comma; if (!cur_idx) return 0; hdr = &idx->v[cur_idx]; if (sol[ctx->del] == ':' && ctx->val + ctx->vlen + ctx->tws == hdr->len) { ...
326,046,548,068,865,270,000,000,000,000,000,000,000
proto_http.c
303,284,703,978,098,730,000,000,000,000,000,000,000
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,566
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int http_replace_header(struct my_regex *re, char *dst, uint dst_size, char *val, int len, const char *rep_str) { if (!regex_exec_match2(re, val, len, MAX_MATCH, pmatch)) return -2; return exp_replace(dst, dst_size, val, rep_str, pmatch); }
300,348,947,508,368,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,567
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int http_replace_value(struct my_regex *re, char *dst, uint dst_size, char *val, int len, char delim, const char *rep_str) { char* p = val; char* dst_end = dst + dst_size; char* dst_p = dst; for (;;) { char *p_delim; /* look for delim. */ p_delim = p; while (p_delim < ...
123,349,398,996,651,380,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,568
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
http_req_get_intercept_rule(struct proxy *px, struct list *rules, struct session *s, struct http_txn *txn) { struct connection *cli_conn; struct http_req_rule *rule; struct hdr_ctx ctx; const char *auth_realm; list_for_each_entry(rule, rules, list) { if (rule->action >= HTTP_REQ_ACT_MAX) continue; /* chec...
325,510,193,986,626,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,569
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
http_res_get_intercept_rule(struct proxy *px, struct list *rules, struct session *s, struct http_txn *txn) { struct connection *cli_conn; struct http_res_rule *rule; struct hdr_ctx ctx; list_for_each_entry(rule, rules, list) { if (rule->action >= HTTP_RES_ACT_MAX) continue; /* check optional condition */ ...
39,236,412,535,884,037,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,570
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_reset_txn(struct session *s) { http_end_txn(s); http_init_txn(s); s->be = s->fe; s->logs.logwait = s->fe->to_log; s->logs.level = 0; session_del_srv_conn(s); s->target = NULL; /* re-init store persistence */ s->store_count = 0; s->uniq_id = global.req_count++; s->pend_pos = NULL; s->req->flags ...
187,680,421,796,943,300,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,571
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_response_forward_body(struct session *s, struct channel *res, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &s->txn.rsp; static struct buffer *tmpbuf = NULL; int compressing = 0; int ret; if (unlikely(msg->msg_state < HTTP_MSG_BODY)) return 0; if ((res->flags & (CF_READ_ERROR|...
339,029,334,928,922,080,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,572
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_resync_states(struct session *s) { struct http_txn *txn = &s->txn; int old_req_state = txn->req.msg_state; int old_res_state = txn->rsp.msg_state; http_sync_req_state(s); while (1) { if (!http_sync_res_state(s)) break; if (!http_sync_req_state(s)) break; } /* OK, both state machines agree on...
225,679,005,427,996,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,573
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void http_return_srv_error(struct session *s, struct stream_interface *si) { int err_type = si->err_type; if (err_type & SI_ET_QUEUE_ABRT) http_server_error(s, si, SN_ERR_CLICL, SN_FINST_Q, 503, http_error_message(s, HTTP_ERR_503)); else if (err_type & SI_ET_CONN_ABRT) http_server_error(s, si, SN_ERR_CLIC...
114,125,324,976,628,660,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,574
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static void http_server_error(struct session *s, struct stream_interface *si, int err, int finst, int status, const struct chunk *msg) { channel_auto_read(si->ob); channel_abort(si->ob); channel_auto_close(si->ob); channel_erase(si->ob); channel_auto_close(si->ib); channel_auto_read(si->ib); if (status ...
216,848,092,907,996,500,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,575
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_sync_req_state(struct session *s) { struct channel *chn = s->req; struct http_txn *txn = &s->txn; unsigned int old_flags = chn->flags; unsigned int old_state = txn->req.msg_state; if (unlikely(txn->req.msg_state < HTTP_MSG_BODY)) return 0; if (txn->req.msg_state == HTTP_MSG_DONE) { /* No need to re...
236,226,408,602,692,440,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,576
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_sync_res_state(struct session *s) { struct channel *chn = s->rep; struct http_txn *txn = &s->txn; unsigned int old_flags = chn->flags; unsigned int old_state = txn->rsp.msg_state; if (unlikely(txn->rsp.msg_state < HTTP_MSG_BODY)) return 0; if (txn->rsp.msg_state == HTTP_MSG_DONE) { /* In theory, we...
101,538,714,813,003,670,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,577
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int http_transform_header(struct session* s, struct http_msg *msg, const char* name, uint name_len, char* buf, struct hdr_idx* idx, struct list *fmt, struct my_regex *re, struct hdr_ctx* ctx, int action) { ctx->idx = 0; while (http_find_full_he...
208,815,395,287,584,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,578
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int http_upgrade_v09_to_v10(struct http_txn *txn) { int delta; char *cur_end; struct http_msg *msg = &txn->req; if (msg->sl.rq.v_l != 0) return 1; /* RFC 1945 allows only GET for HTTP/0.9 requests */ if (txn->meth != HTTP_METH_GET) return 0; cur_end = msg->chn->buf->p + msg->sl.rq.l; delta = 0; ...
238,213,338,580,755,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,579
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_wait_for_request(struct session *s, struct channel *req, int an_bit) { /* * We will parse the partial (or complete) lines. * We will check the request syntax, and also join multi-line * headers. An index of all the lines will be elaborated while * parsing. * * For the parsing, we use a 28 states F...
260,415,183,492,162,820,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,580
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_wait_for_request_body(struct session *s, struct channel *req, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &s->txn.req; /* We have to parse the HTTP request body to find any required data. * "balance url_param check_post" should have been the only way to get * into this. We were...
162,799,632,458,778,490,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,581
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int http_wait_for_response(struct session *s, struct channel *rep, int an_bit) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->rsp; struct hdr_ctx ctx; int use_close_only; int cur_idx; int n; DPRINTF(stderr,"[%u] %s: session=%p b=%p, exp(r,w)=%u,%u bf=%08x bh=%d analysers=%02x\n", now_ms, __FUN...
270,718,489,726,111,120,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,582
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static inline void inet_set_tos(int fd, struct sockaddr_storage from, int tos) { #ifdef IP_TOS if (from.ss_family == AF_INET) setsockopt(fd, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)); #endif #ifdef IPV6_TCLASS if (from.ss_family == AF_INET6) { if (IN6_IS_ADDR_V4MAPPED(&((struct sockaddr_in6 *)&from)->sin6_addr)) ...
259,914,479,602,526,150,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,583
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void init_proto_http() { int i; char *tmp; int msg; for (msg = 0; msg < HTTP_ERR_SIZE; msg++) { if (!http_err_msgs[msg]) { Alert("Internal error: no message defined for HTTP return code %d. Aborting.\n", msg); abort(); } http_err_chunks[msg].str = (char *)http_err_msgs[msg]; http_err_chunks[msg].len...
164,770,501,452,555,740,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,584
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void manage_client_side_appsession(struct session *s, const char *buf, int len) { struct http_txn *txn = &s->txn; appsess *asession = NULL; char *sessid_temp = NULL; if (len > s->be->appsession_len) { len = s->be->appsession_len; } if (s->be->options2 & PR_O2_AS_REQL) { /* request-learn option is enabled : ...
194,329,067,737,340,580,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,585
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void manage_client_side_cookies(struct session *s, struct channel *req) { struct http_txn *txn = &s->txn; int preserve_hdr; int cur_idx, old_idx; char *hdr_beg, *hdr_end, *hdr_next, *del_from; char *prev, *att_beg, *att_end, *equal, *val_beg, *val_end, *next; /* Iterate through the headers, we start with the sta...
242,038,367,415,969,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,586
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
void manage_server_side_cookies(struct session *s, struct channel *res) { struct http_txn *txn = &s->txn; struct server *srv; int is_cookie2; int cur_idx, old_idx, delta; char *hdr_beg, *hdr_end, *hdr_next; char *prev, *att_beg, *att_end, *equal, *val_beg, *val_end, *next; /* Iterate through the headers. * we...
230,021,754,136,823,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,587
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct http_req_rule *parse_http_req_cond(const char **args, const char *file, int linenum, struct proxy *proxy) { struct http_req_rule *rule; struct http_req_action_kw *custom = NULL; int cur_arg; char *error; rule = (struct http_req_rule*)calloc(1, sizeof(struct http_req_rule)); if (!rule) { Alert("parsing [...
287,373,066,586,011,760,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,588
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
struct http_res_rule *parse_http_res_cond(const char **args, const char *file, int linenum, struct proxy *proxy) { struct http_res_rule *rule; struct http_res_action_kw *custom = NULL; int cur_arg; char *error; rule = calloc(1, sizeof(*rule)); if (!rule) { Alert("parsing [%s:%d]: out of memory.\n", file, linen...
225,560,017,721,559,970,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,589
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static struct pattern *pat_match_meth(struct sample *smp, struct pattern_expr *expr, int fill) { int icase; struct pattern_list *lst; struct pattern *pattern; list_for_each_entry(lst, &expr->patterns, list) { pattern = &lst->pat; /* well-known method */ if (pattern->val.i != HTTP_METH_OTHER) { if (smp->d...
259,500,336,201,830,900,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,590
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int sample_conv_http_date(const struct arg *args, struct sample *smp) { const char day[7][4] = { "Mon", "Tue", "Wed", "Thu", "Fri", "Sat", "Sun" }; const char mon[12][4] = { "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec" }; struct chunk *temp; struct tm *tm; time_t curr_d...
316,215,536,551,596,950,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,591
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
static int sample_conv_q_prefered(const struct arg *args, struct sample *smp) { const char *al = smp->data.str.str; const char *end = al + smp->data.str.len; const char *token; int toklen; int qvalue; const char *str; const char *w; int best_q = 0; /* Set the constant to the sample, because the output of the ...
301,229,796,154,892,860,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,592
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int select_compression_request_header(struct session *s, struct buffer *req) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->req; struct hdr_ctx ctx; struct comp_algo *comp_algo = NULL; struct comp_algo *comp_algo_back = NULL; /* Disable compression for older user agents announcing themselves as "...
38,606,711,308,582,664,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,593
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int select_compression_response_header(struct session *s, struct buffer *res) { struct http_txn *txn = &s->txn; struct http_msg *msg = &txn->rsp; struct hdr_ctx ctx; struct comp_type *comp_type; /* no common compression algorithm was found in request header */ if (s->comp_algo == NULL) goto fail; /* HTTP < 1...
91,248,565,961,901,800,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,594
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_base(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; char *ptr, *end, *beg; struct hdr_ctx ctx; struct chunk *temp; CHECK_HTTP_MESSAGE_FIRST(); ctx.idx = 0; if (!http_find_header2...
221,667,793,431,815,470,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,595
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_base32(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_ctx ctx; unsigned int hash = 0; char *ptr, *beg, *end; int len; CHECK_HTTP_MESSAGE_FIRST(); ctx.idx = 0; if (h...
40,026,763,025,351,028,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,596
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_base32_src(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct chunk *temp; struct connection *cli_conn = objt_conn(l4->si[0].end); if (!cli_conn) return 0; if (!smp_fetch_base32(px, l4, l7, opt, ar...
61,932,431,082,690,070,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,597
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_header_req(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct proxy *fe = l4->fe; struct http_txn *txn = l7; int idx; if (!args || args->type != ARGT_UINT) return 0; idx = args->data.uint; i...
234,856,049,313,810,100,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,598
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_header_res(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct proxy *fe = l4->fe; struct http_txn *txn = l7; int idx; if (!args || args->type != ARGT_UINT) return 0; idx = args->data.uint; i...
273,105,418,681,500,030,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,599
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_req_method(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct chunk *temp; struct http_txn *txn = l7; char *ptr; if (!txn->uri) return 0; ptr = txn->uri; while (*ptr != ' ' && *p...
100,804,621,821,213,600,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,600
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_req_uri(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct chunk *temp; struct http_txn *txn = l7; char *ptr; if (!txn->uri) return 0; ptr = txn->uri; while (*ptr != ' ' && *ptr ...
128,490,109,739,199,490,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,601
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_req_ver(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; if (txn->req.msg_state < HTTP_MSG_HDR_FIRST) return 0; if (txn->req.flags & HTTP_MSGF_VER_11) smp->data....
145,025,454,516,257,720,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,602
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_capture_res_ver(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; if (txn->rsp.msg_state < HTTP_MSG_HDR_FIRST) return 0; if (txn->rsp.flags & HTTP_MSGF_VER_11) smp->data....
262,935,868,705,103,700,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,603
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
int smp_fetch_cookie(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx *ctx = smp->ctx.a[2]; const struct http_msg *msg; const char *hdr_name...
15,800,125,251,729,507,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,604
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_cookie_cnt(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx ctx; const struct http_msg *msg; const char *hdr_name; int hdr_na...
6,310,894,881,901,362,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,605
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_cookie_val(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { int ret = smp_fetch_cookie(px, l4, l7, opt, args, smp, kw); if (ret > 0) { smp->type = SMP_T_UINT; smp->data.uint = strl2ic(smp->data.str.str, ...
72,972,951,577,489,990,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,606
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_fhdr(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx *ctx = smp->ctx.a[0]; const struct http_msg *msg = ((opt & SMP_OPT_DIR) == SMP_...
185,659,518,551,696,440,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,607
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_fhdr_cnt(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx ctx; const struct http_msg *msg = ((opt & SMP_OPT_DIR) == SMP_OPT_DIR_RE...
1,897,869,332,587,938,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,608
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_hdr(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx *ctx = smp->ctx.a[0]; const struct http_msg *msg = ((opt & SMP_OPT_DIR) == SMP_OP...
104,015,718,934,687,620,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,609
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_hdr_cnt(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; struct hdr_idx *idx = &txn->hdr_idx; struct hdr_ctx ctx; const struct http_msg *msg = ((opt & SMP_OPT_DIR) == SMP_OPT_DIR_REQ...
91,962,711,327,687,280,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,610
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_hdr_ip(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { int ret; while ((ret = smp_fetch_hdr(px, l4, l7, opt, args, smp, kw)) > 0) { if (url2ipv4((char *)smp->data.str.str, &smp->data.ipv4)) { smp->type = S...
240,090,584,873,229,840,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,611
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_hdr_val(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { int ret = smp_fetch_hdr(px, l4, l7, opt, args, smp, kw); if (ret > 0) { smp->type = SMP_T_UINT; smp->data.uint = strl2ic(smp->data.str.str, smp->data...
114,532,547,653,385,250,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,612
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_http_auth(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { if (!args || args->type != ARGT_USR) return 0; CHECK_HTTP_MESSAGE_FIRST(); if (!get_http_auth(l4)) return 0; smp->type = SMP_T_BOOL; smp->d...
20,949,109,614,564,065,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,613
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_http_auth_grp(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { if (!args || args->type != ARGT_USR) return 0; CHECK_HTTP_MESSAGE_FIRST(); if (!get_http_auth(l4)) return 0; /* if the user does not...
96,965,792,952,931,200,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,614
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_http_first_req(struct proxy *px, struct session *s, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { if (!s) return 0; smp->type = SMP_T_BOOL; smp->data.uint = !(s->txn.flags & TX_NOT_FIRST); return 1; }
72,684,525,279,918,000,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,615
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_meth(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { int meth; struct http_txn *txn = l7; CHECK_HTTP_MESSAGE_FIRST_PERM(); meth = txn->meth; smp->type = SMP_T_METH; smp->data.meth.meth = meth; if (meth == H...
75,028,670,542,659,320,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,616
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_proto_http(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { /* Note: hdr_idx.v cannot be NULL in this ACL because the ACL is tagged * as a layer7 ACL, which involves automatic allocation of hdr_idx. */ C...
325,671,176,679,382,980,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,617
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_rqver(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; char *ptr; int len; CHECK_HTTP_MESSAGE_FIRST(); len = txn->req.sl.rq.v_l; ptr = txn->req.chn->buf->p + txn->req.sl.rq.v; wh...
271,415,553,436,846,030,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,618
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_stcode(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; char *ptr; int len; CHECK_HTTP_MESSAGE_FIRST(); if (txn->rsp.msg_state < HTTP_MSG_BODY) return 0; len = txn->rsp.sl.st.c...
196,552,765,789,218,640,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269
16,619
haproxy
b4d05093bc89f71377230228007e69a1434c1a0c
https://github.com/haproxy/haproxy
https://git.haproxy.org/?p=haproxy-1.5.git;a=commitdiff;h=b4d05093bc89f71377230228007e69a1434c1a0c
None
0
smp_fetch_url(struct proxy *px, struct session *l4, void *l7, unsigned int opt, const struct arg *args, struct sample *smp, const char *kw) { struct http_txn *txn = l7; CHECK_HTTP_MESSAGE_FIRST(); smp->type = SMP_T_STR; smp->data.str.len = txn->req.sl.rq.u_l; smp->data.str.str = txn->req.chn->buf->...
98,637,961,973,658,320,000,000,000,000,000,000,000
None
null
[ "CWE-189" ]
CVE-2014-6269
Multiple integer overflows in the http_request_forward_body function in proto_http.c in HAProxy 1.5-dev23 before 1.5.4 allow remote attackers to cause a denial of service (crash) via a large stream of data, which triggers a buffer overflow and an out-of-bounds read.
https://nvd.nist.gov/vuln/detail/CVE-2014-6269