Vulnerabilities > CVE-2002-0847 - Unspecified vulnerability in Tinyproxy 1.3.2/1.3.3/1.4.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN tinyproxy
nessus
Summary
tinyproxy HTTP proxy 1.5.0, 1.4.3, and earlier allows remote attackers to execute arbitrary code via memory that is freed twice (double-free).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-145.NASL |
description | The authors of tinyproxy, a lightweight HTTP proxy, discovered a bug in the handling of some invalid proxy requests. Under some circumstances, an invalid request may result in allocated memory being freed twice. This can potentially result in the execution of arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14982 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14982 |
title | Debian DSA-145-1 : tinyproxy - doubly freed memory |
References
- http://sourceforge.net/project/shownotes.php?release_id=88790
- http://sourceforge.net/project/shownotes.php?release_id=88790
- http://www.iss.net/security_center/static/9079.php
- http://www.iss.net/security_center/static/9079.php
- http://www.securityfocus.com/bid/4731
- http://www.securityfocus.com/bid/4731
- https://www.debian.org/security/2002/dsa-145
- https://www.debian.org/security/2002/dsa-145