Multiple open vulnerabilities in tinyproxy

Bug #1154502 reported by Christian Kuersteiner
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tinyproxy (Ubuntu)
Fix Released
High
Unassigned
Precise
Fix Released
High
Unassigned

Bug Description

There are multiple open vulnerabilities (security bypass, DoS) in tinyproxy affecting lucid up to raring.

information type: Private Security → Public Security
Revision history for this message
Christian Kuersteiner (ckuerste) wrote :

Note that CVE-2011-1499 and CVE-2011-1843 don't affect precise (higher version than the vulnerable one). Hence just added patch for CVE-2012-3505.

Revision history for this message
Christian Kuersteiner (ckuerste) wrote :

quantal and raring are not affected by any of these vulnerabilities. Both already include all the needed fixes.

Changed in tinyproxy (Ubuntu):
status: New → Fix Released
importance: Undecided → High
Changed in tinyproxy (Ubuntu Precise):
importance: Undecided → High
status: New → Triaged
Revision history for this message
Seth Arnold (seth-arnold) wrote :

Thanks Christian,

I had to make a slight change to the patch to build without warnings -- both <stdlib.h> and <time.h> were already included via a "common.h" header file.

Revision history for this message
Michael Adam (obnox) wrote :

indeed.
I have added updated patches to the upstream bug report:
https://banu.com/bugzilla/show_bug.cgi?id=110
Those adhere to coding guidelines and also add configure check for
the newly used functions (time, rand, srand).

These could go upstream.
I need to really understand the problem though
(i.e I am not certain that I understand the phenomenon.
the bug report does not contain a precise desciption.
or I am not able to reproduce.)

Thanks for any details!

Michael

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package tinyproxy - 1.8.3-1ubuntu0.1

---------------
tinyproxy (1.8.3-1ubuntu0.1) precise-security; urgency=low

  * SECURITY UPDATE: Fix for denial of service vulnerability where remote
    attackers send crafted request headers. (LP: #1154502)
    - debian/patches/001-CVE-2012-3505.patch: Limit the number of headers to
      prevent DoS attacks. Randomize hashmaps in order to avoid fake headers
      getting included in the same bucket, allowing for DoS attacks.
    - CVE-2012-3505
 -- Christian Kuersteiner <email address hidden> Wed, 13 Mar 2013 16:42:14 +0700

Changed in tinyproxy (Ubuntu Precise):
status: Triaged → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.