[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-1499Date: (C)2011-04-29   (M)2023-12-22


acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.6
Exploit Score: 4.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
SECUNIA-44274
DSA-2222
http://openwall.com/lists/oss-security/2011/04/07/9
http://openwall.com/lists/oss-security/2011/04/08/3
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493
https://banu.com/bugzilla/show_bug.cgi?id=90
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4
https://bugzilla.redhat.com/show_bug.cgi?id=694658
tinyproxy-aclc-sec-bypass(67256)

CPE    12
cpe:/a:banu:tinyproxy:1.6.0:pre1
cpe:/a:banu:tinyproxy:1.6.0:pre4
cpe:/a:banu:tinyproxy:1.6.0:pre3
cpe:/a:banu:tinyproxy:1.6.0:pre2
...
CWE    1
CWE-16
OVAL    2
oval:org.secpod.oval:def:600238
oval:org.secpod.oval:def:105966

© SecPod Technologies