All the vulnerabilites related to Tinyproxy - Tinyproxy
cve-2002-0847
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:03
Severity ?
EPSS score ?
Summary
tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free).
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2002/dsa-145 | vendor-advisory, x_refsource_DEBIAN | |
http://www.iss.net/security_center/static/9079.php | vdb-entry, x_refsource_XF | |
http://sourceforge.net/project/shownotes.php?release_id=88790 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/4731 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:03:49.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-145", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2002/dsa-145" }, { "name": "tinyproxy-memory-corruption(9079)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/9079.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=88790" }, { "name": "4731", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4731" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-08-31T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-145", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2002/dsa-145" }, { "name": "tinyproxy-memory-corruption(9079)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/9079.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/project/shownotes.php?release_id=88790" }, { "name": "4731", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4731" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0847", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-145", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2002/dsa-145" }, { "name": "tinyproxy-memory-corruption(9079)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/9079.php" }, { "name": "http://sourceforge.net/project/shownotes.php?release_id=88790", "refsource": "CONFIRM", "url": "http://sourceforge.net/project/shownotes.php?release_id=88790" }, { "name": "4731", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4731" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0847", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-08-09T00:00:00", "dateUpdated": "2024-08-08T03:03:49.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0129
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:06
Severity ?
EPSS score ?
Summary
Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/5954 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2001/dsa-018 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/2217 | vdb-entry, x_refsource_BID | |
http://marc.info/?l=bugtraq&m=97975486527750&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "tinyproxy-remote-bo(5954)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954" }, { "name": "DSA-018", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2001/dsa-018" }, { "name": "2217", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/2217" }, { "name": "20010117 [pkc] remote heap overflow in tinyproxy", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=97975486527750\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "tinyproxy-remote-bo(5954)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954" }, { "name": "DSA-018", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2001/dsa-018" }, { "name": "2217", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/2217" }, { "name": "20010117 [pkc] remote heap overflow in tinyproxy", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=97975486527750\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "tinyproxy-remote-bo(5954)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5954" }, { "name": "DSA-018", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2001/dsa-018" }, { "name": "2217", "refsource": "BID", "url": "http://www.securityfocus.com/bid/2217" }, { "name": "20010117 [pkc] remote heap overflow in tinyproxy", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=97975486527750\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0129", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2001-02-06T00:00:00", "dateUpdated": "2024-08-08T04:06:55.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-49606
Vulnerability from cvelistv5
Published
2024-05-01 15:31
Modified
2024-08-02 22:01
Severity ?
EPSS score ?
Summary
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:tinyproxy:tinyproxy:1.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tinyproxy", "vendor": "tinyproxy", "versions": [ { "status": "affected", "version": "1.10.0" } ] }, { "cpes": [ "cpe:2.3:a:tinyproxy:tinyproxy:1.11.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tinyproxy", "vendor": "tinyproxy", "versions": [ { "status": "affected", "version": "1.11.1" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-49606", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-08T13:44:20.408622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:27:48.362Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T22:01:25.811Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889", "tags": [ "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/05/07/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Tinyproxy", "vendor": "Tinyproxy", "versions": [ { "status": "affected", "version": "1.11.1" }, { "status": "affected", "version": "Tinyproxy 1.10.0" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by Dimitrios Tatsis of Cisco Talos." } ], "descriptions": [ { "lang": "en", "value": "A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-01T17:00:16.786Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889" }, { "url": "http://www.openwall.com/lists/oss-security/2024/05/07/1" } ] } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-49606", "datePublished": "2024-05-01T15:31:01.499Z", "dateReserved": "2023-12-05T17:05:52.210Z", "dateUpdated": "2024-08-02T22:01:25.811Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40533
Vulnerability from cvelistv5
This CVE ID is a duplicate of CVE-2022-40468
Replaced by CVE-2022-40468
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-05-08T21:49:47.414Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "rejectedReasons": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This CVE ID is a duplicate of CVE-2022-40468\u003cbr\u003e" } ], "value": "This CVE ID is a duplicate of CVE-2022-40468\n" } ], "replacedBy": [ "CVE-2022-40468" ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2023-40533", "datePublished": "2024-05-01T15:31:00.893Z", "dateRejected": "2024-05-08T21:49:47.414Z", "dateReserved": "2023-12-11T20:46:38.182Z", "dateUpdated": "2024-05-08T21:49:47.414Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }