2.6
CVSSv2

CVE-2011-1499

Published: 29/04/2011 Updated: 17/08/2017
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

acl.c in Tinyproxy prior to 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote malicious users to hide the origin of web traffic by leveraging the open HTTP proxy server.

Vulnerable Product Search on Vulmon Subscribe to Product

banu tinyproxy 1.7.1

banu tinyproxy 1.7.0

banu tinyproxy 1.6.0

banu tinyproxy 1.5.0

banu tinyproxy 1.5.1

banu tinyproxy

banu tinyproxy 1.6.2

banu tinyproxy 1.5.3

banu tinyproxy 1.8.1

banu tinyproxy 1.8.0

banu tinyproxy 1.6.4

banu tinyproxy 1.6.3

banu tinyproxy 1.6.5

banu tinyproxy 1.6.1

banu tinyproxy 1.5.2

debian debian linux 6.0

Vendor Advisories

Debian Bug report logs - #621493 tinyproxy: allows everyone if using network addresses in Allow rule Package: tinyproxy; Maintainer for tinyproxy is Mike Gabriel <sunweaver@debianorg>; Source for tinyproxy is src:tinyproxy (PTS, buildd, popcon) Reported by: Christoph Martin <martin@uni-mainzde> Date: Thu, 7 Apr 20 ...
Christoph Martin discovered that incorrect ACL processing in TinyProxy, a lightweight, non-caching, optionally anonymizing HTTP proxy, could lead to unintended network access rights The oldstable distribution (lenny) is not affected For the stable distribution (squeeze), this problem has been fixed in version 182-1squeeze1 For the unstable dis ...