5 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability. Existe una vulnerabilidad de use-after-free en el análisis de los encabezados de conexión HTTP en Tinyproxy 1.11.1 y Tinyproxy 1.10.0. Un encabezado HTTP especialmente manipulado puede provocar la reutilización de la memoria previamente liberada, lo que provoca daños en la memoria y podría provocar la ejecución remota de código. • https://github.com/d0rb/CVE-2023-49606 http://www.openwall.com/lists/oss-security/2024/05/07/1 https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function. Posible fuga de datos sobrantes de la pila si se utilizan plantillas de páginas de error personalizadas que contienen variables especiales no estándar. El commit 84f203f de Tinyproxy y los anteriores utilizan búferes no inicializados en la función process_request() • https://github.com/tinyproxy/tinyproxy https://github.com/tinyproxy/tinyproxy/blob/84f203fb1c4733608c7283bbe794005a469c4b00/src/reqs.c#L346 https://github.com/tinyproxy/tinyproxy/issues/457 https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815 https://security.gentoo.org/glsa/202305-27 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinyproxy.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for tinyproxy.pid modification before a root script executes a "kill `cat /run/tinyproxy/tinyproxy.pid`" command. El archivo main.c en Tinyproxy versión 1.8.4 y anteriores, crea un archivo /run/tinyproxy/tinyproxy.pid después de quitar los privilegios a una cuenta no root, lo que podría permitir a los usuarios locales eliminar procesos arbitrarios mediante el aprovechamiento del acceso a esta cuenta no root para la modificación de Tinyproxy.pid antes de que un script root ejecute el comando "kill` cat/run/tinyproxy/tinyproxy.pid`". • https://github.com/tinyproxy/tinyproxy/issues/106 https://lists.debian.org/debian-lts-announce/2020/03/msg00037.html • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free). • http://sourceforge.net/project/shownotes.php?release_id=88790 http://www.iss.net/security_center/static/9079.php http://www.securityfocus.com/bid/4731 https://www.debian.org/security/2002/dsa-145 •

CVSS: 10.0EPSS: 7%CPEs: 2EXPL: 2

Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request. • https://www.exploit-db.com/exploits/20559 http://marc.info/?l=bugtraq&m=97975486527750&w=2 http://www.debian.org/security/2001/dsa-018 http://www.securityfocus.com/bid/2217 https://exchange.xforce.ibmcloud.com/vulnerabilities/5954 •