CVE-2012-3505
09.10.2012, 23:55
Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.Enginsight
Vendor | Product | Version |
---|---|---|
banu | tinyproxy | 𝑥 ≤ 1.8.3 |
banu | tinyproxy | 1.5.0 |
banu | tinyproxy | 1.5.0:pre1 |
banu | tinyproxy | 1.5.0:pre2 |
banu | tinyproxy | 1.5.0:pre3 |
banu | tinyproxy | 1.5.0:pre4 |
banu | tinyproxy | 1.5.0:pre5 |
banu | tinyproxy | 1.5.0:pre6 |
banu | tinyproxy | 1.5.0:rc1 |
banu | tinyproxy | 1.5.0:rc10 |
banu | tinyproxy | 1.5.0:rc2 |
banu | tinyproxy | 1.5.0:rc4 |
banu | tinyproxy | 1.5.0:rc5 |
banu | tinyproxy | 1.5.0:rc6 |
banu | tinyproxy | 1.5.0:rc7 |
banu | tinyproxy | 1.5.0:rc8 |
banu | tinyproxy | 1.5.0:rc9 |
banu | tinyproxy | 1.5.1 |
banu | tinyproxy | 1.5.1:pre1 |
banu | tinyproxy | 1.5.1:pre2 |
banu | tinyproxy | 1.5.1:pre3 |
banu | tinyproxy | 1.5.1:pre4 |
banu | tinyproxy | 1.5.1:pre5 |
banu | tinyproxy | 1.5.1:pre6 |
banu | tinyproxy | 1.5.1:rc1 |
banu | tinyproxy | 1.5.1:rc2 |
banu | tinyproxy | 1.5.1:rc3 |
banu | tinyproxy | 1.5.1:rc4 |
banu | tinyproxy | 1.5.2 |
banu | tinyproxy | 1.5.2:rc1 |
banu | tinyproxy | 1.5.2:rc2 |
banu | tinyproxy | 1.5.3 |
banu | tinyproxy | 1.5.3:rc1 |
banu | tinyproxy | 1.6.0 |
banu | tinyproxy | 1.6.0:a |
banu | tinyproxy | 1.6.0:pre1 |
banu | tinyproxy | 1.6.0:pre2 |
banu | tinyproxy | 1.6.0:pre3 |
banu | tinyproxy | 1.6.0:pre4 |
banu | tinyproxy | 1.6.0:rc1 |
banu | tinyproxy | 1.6.0:rc2 |
banu | tinyproxy | 1.6.0:rc3 |
banu | tinyproxy | 1.6.1 |
banu | tinyproxy | 1.6.2 |
banu | tinyproxy | 1.6.3 |
banu | tinyproxy | 1.6.4 |
banu | tinyproxy | 1.6.5 |
banu | tinyproxy | 1.7.0 |
banu | tinyproxy | 1.7.1 |
banu | tinyproxy | 1.8.0 |
banu | tinyproxy | 1.8.1 |
banu | tinyproxy | 1.8.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References