First published: Thu Apr 07 2011(Updated: )
acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tinyproxy | =1.7.1 | |
Tinyproxy | =1.6.0-pre4 | |
Tinyproxy | =1.5.0-rc6 | |
Tinyproxy | =1.6.0-rc2 | |
Tinyproxy | =1.5.2 | |
Tinyproxy | =1.6.5 | |
Tinyproxy | =1.5.1-pre5 | |
Tinyproxy | =1.5.0-rc8 | |
Tinyproxy | =1.6.0-pre2 | |
Tinyproxy | =1.6.0-a | |
Tinyproxy | =1.5.0-pre6 | |
Tinyproxy | =1.5.0-pre5 | |
Tinyproxy | =1.5.1-pre2 | |
Tinyproxy | =1.5.3 | |
Tinyproxy | =1.5.0-rc9 | |
Tinyproxy | =1.5.1 | |
Tinyproxy | =1.6.1 | |
Tinyproxy | =1.5.1-rc3 | |
Tinyproxy | =1.5.0-rc1 | |
Tinyproxy | =1.6.4 | |
Tinyproxy | =1.5.0-rc7 | |
Tinyproxy | =1.5.2-rc1 | |
Tinyproxy | =1.7.0 | |
Tinyproxy | =1.5.0-pre2 | |
Tinyproxy | =1.5.0-pre3 | |
Tinyproxy | =1.5.0-rc10 | |
Tinyproxy | =1.6.0-pre3 | |
Tinyproxy | =1.8.0 | |
Tinyproxy | =1.5.3-rc1 | |
Tinyproxy | =1.5.1-pre6 | |
Tinyproxy | =1.5.0 | |
Tinyproxy | =1.6.0-pre1 | |
Tinyproxy | =1.5.0-pre1 | |
Tinyproxy | =1.5.1-rc4 | |
Tinyproxy | =1.6.2 | |
Tinyproxy | =1.5.1-pre1 | |
Tinyproxy | =1.6.0-rc3 | |
Tinyproxy | =1.5.0-rc2 | |
Tinyproxy | =1.5.1-rc2 | |
Tinyproxy | =1.5.2-rc2 | |
Tinyproxy | =1.6.3 | |
Tinyproxy | =1.5.1-rc1 | |
Tinyproxy | =1.8.1 | |
Tinyproxy | =1.5.0-rc5 | |
Tinyproxy | =1.5.0-rc4 | |
Tinyproxy | =1.5.1-pre3 | |
Tinyproxy | =1.5.1-pre4 | |
Tinyproxy | =1.6.0-rc1 | |
Tinyproxy | <=1.8.2 | |
Tinyproxy | =1.6.0 | |
Tinyproxy | =1.5.0-pre4 | |
Debian Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1499 is considered a medium severity vulnerability due to its potential to allow unauthorized access via an open HTTP proxy.
To fix CVE-2011-1499, update Tinyproxy to version 1.8.3 or later, which addresses this vulnerability.
CVE-2011-1499 affects various versions of Tinyproxy prior to 1.8.3 running on systems that utilize allow configuration settings with CIDR blocks.
Exploiting CVE-2011-1499 allows remote attackers to obscure the origin of web traffic, potentially facilitating malicious activity.
While specific exploits for CVE-2011-1499 have not been widely reported, the nature of the vulnerability poses risks if not mitigated.