acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
References
Link | Resource |
---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493 | Issue Tracking Patch |
http://openwall.com/lists/oss-security/2011/04/07/9 | Mailing List Third Party Advisory |
http://openwall.com/lists/oss-security/2011/04/08/3 | Mailing List Third Party Advisory |
http://secunia.com/advisories/44274 | |
http://www.debian.org/security/2011/dsa-2222 | Third Party Advisory |
https://banu.com/bugzilla/show_bug.cgi?id=90 | Broken Link |
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=694658 | Issue Tracking Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67256 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2011-04-29T22:00:00
Updated: 2017-08-16T14:57:01
Reserved: 2011-03-21T00:00:00
Link: CVE-2011-1499
JSON object: View
NVD Information
Status : Modified
Published: 2011-04-29T22:55:00.937
Modified: 2017-08-17T01:34:14.540
Link: CVE-2011-1499
JSON object: View
Redhat Information
No data.
CWE