Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 7 May 2024 10:38:08 +0300
From: Valtteri Vuorikoski <>
Subject: CVE-2023-49606, CVE-2023-40533: memory safety vulnerabilities in
 tinyproxy <=1.11.1

Cisco Talos reports two memory safety vulnerabilities in tinyproxy, a small HTTP
proxy server, in versions prior to 1.11.2 (not yet released). Quotes from the
two advisories below.

First advisory <>:


  A use-after-free vulnerability exists in the HTTP Connection Headers parsing
  in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can
  trigger reuse of previously freed memory, which leads to memory corruption and
  could lead to remote code execution. An attacker needs to make an
  unauthenticated HTTP request to trigger this vulnerability.

  9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:Hv

Second advisory <>:


  An uninitialized memory use vulnerability exists in Tinyproxy 1.11.1 while
  parsing HTTP requests. In certain configurations, a specially crafted HTTP
  request can result in disclosure of data allocated on the heap, which could
  contain sensitive information. An attacker can make an unauthenticated HTTP
  request to trigger this vulnerability.

  5.9 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Upstream has an issue open at
<>.  Talos claims to have
contacted them in December 2023, but according to the developer there was no
contact before the above advisories were released. The developer also disputes
the veracity of CVE-2023-40533. Whatever the case,
is the official fix for CVE-2023-49606.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.