An out-of-bounds read in dnsvalidatednsresponse in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of acceptedpayload_size.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.8.14."
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-20102.json"