6.8
CVSSv2

CVE-2011-1843

Published: 03/05/2011 Updated: 07/09/2011
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in conf.c in Tinyproxy prior to 1.8.3 might allow remote malicious users to bypass intended access restrictions in opportunistic circumstances via a TCP connection, related to improper handling of invalid port numbers.

Vulnerable Product Search on Vulmon Subscribe to Product

banu tinyproxy

banu tinyproxy 1.6.0

banu tinyproxy 1.6.4

banu tinyproxy 1.5.0

banu tinyproxy 1.5.1

banu tinyproxy 1.5.3

banu tinyproxy 1.6.1

banu tinyproxy 1.6.2

banu tinyproxy 1.5.2

banu tinyproxy 1.7.1

banu tinyproxy 1.7.0

banu tinyproxy 1.6.5

banu tinyproxy 1.8.1

banu tinyproxy 1.8.0

banu tinyproxy 1.6.3

Vendor Advisories

Debian Bug report logs - #627503 Validate Port directive value Package: tinyproxy; Maintainer for tinyproxy is Mike Gabriel <sunweaver@debianorg>; Source for tinyproxy is src:tinyproxy (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sat, 21 May 2011 09:48:02 UTC Severity: important Fi ...