SB2012101002 - Input validation error in tinyproxy
Published: October 10, 2012 Updated: August 3, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2012-3505)
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably.
Remediation
Install update from vendor's website.
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281
- http://secunia.com/advisories/50278
- http://secunia.com/advisories/51074
- http://www.debian.org/security/2012/dsa-2564
- http://www.openwall.com/lists/oss-security/2012/08/17/3
- http://www.openwall.com/lists/oss-security/2012/08/18/1
- http://www.securitytracker.com/id?1027412
- https://banu.com/bugzilla/show_bug.cgi?id=110
- https://banu.com/bugzilla/show_bug.cgi?id=110#c2
- https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985