{"id":"CVE-2018-19115","details":"keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.","modified":"2026-04-16T06:22:48.728927497Z","published":"2018-11-08T20:29:00.573Z","references":[{"type":"WEB","url":"https://usn.ubuntu.com/3995-1/"},{"type":"WEB","url":"https://usn.ubuntu.com/3995-2/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-01"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1945"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00034.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0022"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1792"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1015141"},{"type":"FIX","url":"https://github.com/acassen/keepalived/pull/961"},{"type":"FIX","url":"https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/acassen/keepalived","events":[{"introduced":"0"},{"fixed":"c9e2da7a14513ae7979854afe57cd4cb0d1a3092"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.0.7"}]}}],"versions":["1.3.1","v0.2.1","v0.2.3","v0.2.6","v0.2.7","v0.3.5","v0.3.6","v0.3.7","v0.3.8","v0.4.0","v0.4.1","v0.4.8","v0.4.9","v0.4.9a","v0.5.3","v0.5.5","v0.5.6","v0.5.7","v0.5.8","v0.5.9","v0.6.1","v0.6.10","v0.6.2","v0.6.3","v0.6.4","v0.6.6","v0.6.8","v0.6.9","v0.7.1","v0.7.6","v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.14","v1.1.15","v1.1.16","v1.1.17","v1.1.18","v1.1.19","v1.1.2","v1.1.3","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v1.2.1","v1.2.10","v1.2.11","v1.2.12","v1.2.13","v1.2.14","v1.2.15","v1.2.16","v1.2.17","v1.2.18","v1.2.19","v1.2.2","v1.2.20","v1.2.21","v1.2.22","v1.2.23","v1.2.24","v1.2.3","v1.2.4","v1.2.5","v1.2.6","v1.2.7","v1.2.8","v1.2.9","v1.3.0","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.3.7","v1.3.8","v1.3.9","v1.4.0","v1.4.1","v1.4.2","v1.4.3","v1.4.4","v1.4.5","v2.0.0","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.6"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19115.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}