⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2024-45506Infinite Loop in Haproxy

CWE-835Infinite Loop7 documents7 sources
Severity
7.5HIGHNVD
EPSS
1.5%
top 18.89%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 4
Latest updateSep 10

Description

HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions, as exploited in the wild in 2024.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

debiandebian/haproxy< haproxy 2.9.10-1 (forky)
NVDhaproxy/haproxy2.9.02.9.10+2
Debianhaproxy/haproxy< 2.9.10-1+1

🔴Vulnerability Details

3
GHSA
GHSA-gmvf-rv8w-2hrh: HAProxy 22024-09-04
OSV
CVE-2024-45506: HAProxy 22024-09-04
VulnCheck
HAProxy Endless Loop HTTP/2 Vulnerability2024

📋Vendor Advisories

3
Microsoft
HAProxy 2.9.x before 2.9.10 3.0.x before 3.0.4 and 3.1.x through 3.1-dev6 allows a remote denial of service for HTTP/2 zero-copy forwarding (h2_send loop) under a certain set of conditions as exploite2024-09-10
Red Hat
haproxy: potential infinite loop condition in the h2_send() may trigger a DoS2024-09-04
Debian
CVE-2024-45506: haproxy - HAProxy 2.9.x before 2.9.10, 3.0.x before 3.0.4, and 3.1.x through 3.1-dev6 allo...2024