Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://banu.com/bugzilla/show_bug.cgi?id=110 | x_refsource_MISC |
http://www.openwall.com/lists/oss-security/2012/08/17/3 | mailing-list x_refsource_MLIST |
https://banu.com/bugzilla/show_bug.cgi?id=110#c2 | x_refsource_CONFIRM |
http://www.securitytracker.com/id?1027412 | vdb-entry x_refsource_SECTRACK |
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985 | x_refsource_CONFIRM |
http://www.openwall.com/lists/oss-security/2012/08/18/1 | mailing-list x_refsource_MLIST |
http://secunia.com/advisories/51074 | third-party-advisory x_refsource_SECUNIA |
http://www.debian.org/security/2012/dsa-2564 | vendor-advisory x_refsource_DEBIAN |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281 | x_refsource_MISC |
http://secunia.com/advisories/50278 | third-party-advisory x_refsource_SECUNIA |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://banu.com/bugzilla/show_bug.cgi?id=110 | x_refsource_MISC x_transferred |
http://www.openwall.com/lists/oss-security/2012/08/17/3 | mailing-list x_refsource_MLIST x_transferred |
https://banu.com/bugzilla/show_bug.cgi?id=110#c2 | x_refsource_CONFIRM x_transferred |
http://www.securitytracker.com/id?1027412 | vdb-entry x_refsource_SECTRACK x_transferred |
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985 | x_refsource_CONFIRM x_transferred |
http://www.openwall.com/lists/oss-security/2012/08/18/1 | mailing-list x_refsource_MLIST x_transferred |
http://secunia.com/advisories/51074 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://www.debian.org/security/2012/dsa-2564 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281 | x_refsource_MISC x_transferred |
http://secunia.com/advisories/50278 | third-party-advisory x_refsource_SECUNIA x_transferred |
Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |