5
CVSSv2

CVE-2012-3505

Published: 09/10/2012 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Tinyproxy 1.8.3 and previous versions allows remote malicious users to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

banu tinyproxy 1.7.1

banu tinyproxy 1.6.0

banu tinyproxy 1.5.0

banu tinyproxy 1.5.2

banu tinyproxy 1.6.5

banu tinyproxy

banu tinyproxy 1.5.1

banu tinyproxy 1.5.3

banu tinyproxy 1.6.1

banu tinyproxy 1.6.4

banu tinyproxy 1.8.2

banu tinyproxy 1.7.0

banu tinyproxy 1.8.0

banu tinyproxy 1.6.2

banu tinyproxy 1.6.3

banu tinyproxy 1.8.1

Vendor Advisories

Debian Bug report logs - #685281 denial of service via many headers Package: tinyproxy; Maintainer for tinyproxy is Mike Gabriel <sunweaver@debianorg>; Source for tinyproxy is src:tinyproxy (PTS, buildd, popcon) Reported by: Thijs Kinkhorst <thijs@debianorg> Date: Sun, 19 Aug 2012 09:45:04 UTC Severity: serious Ta ...
gpernot discovered that Tinyproxy, a HTTP proxy, is vulnerable to a denial of service by remote attackers by sending crafted request headers For the stable distribution (squeeze), this problem has been fixed in version 182-1squeeze3 For the testing distribution (wheezy), this problem has been fixed in version 183-3 For the unstable distribut ...