First published: Mon Mar 12 2001(Updated: )
Buffer overflow in Tinyproxy HTTP proxy 1.3.3 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long connect request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinyproxy | =1.3.3 | |
Tinyproxy | <=1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0129 has a high severity rating due to its potential to allow remote code execution and cause denial of service.
To fix CVE-2001-0129, upgrade Tinyproxy to version 1.3.4 or later, as this vulnerability is addressed in that release.
CVE-2001-0129 affects Tinyproxy versions 1.3.3 and earlier.
Yes, CVE-2001-0129 allows remote attackers to potentially execute arbitrary commands due to a buffer overflow.
CVE-2001-0129 can be exploited to perform denial of service attacks as well as potentially executing malicious code.