Bug 2278395 (CVE-2023-49606) - CVE-2023-49606 tinyproxy: HTTP connection headers use-after-free vulnerability
Summary: CVE-2023-49606 tinyproxy: HTTP connection headers use-after-free vulnerability
Keywords:
Status: NEW
Alias: CVE-2023-49606
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2278397 2278396
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-05-01 20:09 UTC by Robb Gatica
Modified: 2024-05-01 20:09 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2024-05-01 20:09:26 UTC
A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.

https://talosintelligence.com/vulnerability_reports/TALOS-2023-1889

Comment 1 Robb Gatica 2024-05-01 20:09:47 UTC
Created tinyproxy tracking bugs for this issue:

Affects: epel-all [bug 2278397]
Affects: fedora-all [bug 2278396]


Note You need to log in before you can comment on or make changes to this bug.