{"id":"UBUNTU-CVE-2018-20102","details":"An out-of-bounds read in dns_validate_dns_response in dns.c was discovered in HAProxy through 1.8.14. Due to a missing check when validating DNS responses, remote attackers might be able read the 16 bytes corresponding to an AAAA record from the non-initialized part of the buffer, possibly accessing anything that was left on the stack, or even past the end of the 8193-byte buffer, depending on the value of accepted_payload_size.","modified":"2026-01-30T00:46:40.414084Z","published":"2018-12-12T00:00:00Z","related":["USN-3858-1"],"upstream":["CVE-2018-20102"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20102"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-3858-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-20102"}],"affected":[{"package":{"name":"haproxy","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/haproxy@1.6.3-1ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.6.3-1ubuntu0.2"}]}],"versions":["1.5.14-1","1.5.15-1","1.6.2-1","1.6.2-2","1.6.2-2ubuntu1","1.6.2-2ubuntu3","1.6.3-1","1.6.3-1ubuntu0.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"haproxy","binary_version":"1.6.3-1ubuntu0.2"},{"binary_name":"vim-haproxy","binary_version":"1.6.3-1ubuntu0.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20102.json"}},{"package":{"name":"haproxy","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/haproxy@1.8.8-1ubuntu0.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.8-1ubuntu0.3"}]}],"versions":["1.7.9-1ubuntu1","1.7.9-1ubuntu2","1.8.4-1","1.8.7-1","1.8.8-1","1.8.8-1ubuntu0.1","1.8.8-1ubuntu0.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"haproxy","binary_version":"1.8.8-1ubuntu0.3"},{"binary_name":"vim-haproxy","binary_version":"1.8.8-1ubuntu0.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20102.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}