Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-40468

Опубликовано: 19 сент. 2022
Источник: debian
EPSS Низкий

Описание

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tinyproxyfixed1.11.1-2package
tinyproxypostponedbusterpackage

Примечания

  • https://github.com/tinyproxy/tinyproxy/issues/457

  • https://github.com/tinyproxy/tinyproxy/commit/3764b8551463b900b5b4e3ec0cd9bb9182191cb7

EPSS

Процентиль: 32%
0.00124
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.

CVSS3: 7.5
nvd
больше 3 лет назад

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.

CVSS3: 7.5
github
больше 3 лет назад

Tinyproxy commit 84f203f and earlier does not process HTTP request lines in the process_request() function and is using uninitialized buffers. This vulnerability allows attackers to access sensitive information at system runtime.

suse-cvrf
больше 1 года назад

Security update for tinyproxy

EPSS

Процентиль: 32%
0.00124
Низкий