CVE-2018-19115Out-of-bounds Write in Keepalived

Severity
9.8CRITICALNVD
EPSS
6.2%
top 9.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 8
Latest updateMay 13

Description

keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

Also affects: Debian Linux 8.0, Enterprise Linux 7.6

Patches

🔴Vulnerability Details

3
GHSA
GHSA-q8cg-hf8f-hgf3: keepalived before 22022-05-13
OSV
CVE-2018-19115: keepalived before 22018-11-08
CVEList
CVE-2018-19115: keepalived before 22018-11-08

📋Vendor Advisories

4
Ubuntu
Keepalived vulnerability2019-05-28
Ubuntu
Keepalived vulnerability2019-05-28
Red Hat
keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution2018-11-08
Debian
CVE-2018-19115: keepalived - keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP statu...2018

💬Community

2
Bugzilla
CVE-2018-19115 keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution2018-11-21
Bugzilla
CVE-2018-19115 keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution [fedora-all]2018-11-21
CVE-2018-19115 — Out-of-bounds Write in Keepalived | cvebase