{"id":"CVE-2013-1912","details":"Buffer overflow in HAProxy 1.4 through 1.4.22 and 1.5-dev through 1.5-dev17, when HTTP keep-alive is enabled, using HTTP keywords in TCP inspection rules, and running with rewrite rules that appends to requests, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted pipelined HTTP requests that prevent request realignment from occurring.","modified":"2026-04-10T03:36:01.251698Z","published":"2013-04-10T15:55:15Z","related":["openSUSE-SU-2024:10114-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-0729.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-0868.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/52725"},{"type":"ADVISORY","url":"http://www.debian.org/security/2013/dsa-2711"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1800-1"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103730.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103770.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103794.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2013/04/03/1"},{"type":"WEB","url":"http://www.securityfocus.com/bid/58820"}],"schema_version":"1.7.5"}