Input validation error in tinyproxy - CVE-2012-3505
Published: October 10, 2012 / Updated: August 3, 2020
tinyproxy
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably.
How to mitigate CVE-2012-3505
Sources
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281
- http://secunia.com/advisories/50278
- http://secunia.com/advisories/51074
- http://www.debian.org/security/2012/dsa-2564
- http://www.openwall.com/lists/oss-security/2012/08/17/3
- http://www.openwall.com/lists/oss-security/2012/08/18/1
- http://www.securitytracker.com/id?1027412
- https://banu.com/bugzilla/show_bug.cgi?id=110
- https://banu.com/bugzilla/show_bug.cgi?id=110#c2
- https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985