First published: Tue May 03 2011(Updated: )
Integer overflow in conf.c in Tinyproxy before 1.8.3 might allow remote attackers to bypass intended access restrictions in opportunistic circumstances via a TCP connection, related to improper handling of invalid port numbers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tinyproxy | =1.7.1 | |
Tinyproxy | =1.6.0-pre4 | |
Tinyproxy | =1.5.0-rc6 | |
Tinyproxy | =1.6.0-rc2 | |
Tinyproxy | =1.5.2 | |
Tinyproxy | =1.6.5 | |
Tinyproxy | =1.5.1-pre5 | |
Tinyproxy | =1.5.0-rc8 | |
Tinyproxy | =1.6.0-pre2 | |
Tinyproxy | =1.6.0-a | |
Tinyproxy | =1.5.0-pre6 | |
Tinyproxy | =1.5.0-pre5 | |
Tinyproxy | =1.5.1-pre2 | |
Tinyproxy | =1.5.3 | |
Tinyproxy | =1.5.0-rc9 | |
Tinyproxy | =1.5.1 | |
Tinyproxy | =1.6.1 | |
Tinyproxy | =1.5.1-rc3 | |
Tinyproxy | =1.5.0-rc1 | |
Tinyproxy | =1.6.4 | |
Tinyproxy | =1.5.0-rc7 | |
Tinyproxy | =1.5.2-rc1 | |
Tinyproxy | =1.7.0 | |
Tinyproxy | =1.5.0-pre2 | |
Tinyproxy | =1.5.0-pre3 | |
Tinyproxy | =1.5.0-rc10 | |
Tinyproxy | =1.6.0-pre3 | |
Tinyproxy | =1.8.0 | |
Tinyproxy | =1.5.3-rc1 | |
Tinyproxy | =1.5.1-pre6 | |
Tinyproxy | =1.5.0 | |
Tinyproxy | =1.6.0-pre1 | |
Tinyproxy | =1.5.0-pre1 | |
Tinyproxy | =1.5.1-rc4 | |
Tinyproxy | =1.6.2 | |
Tinyproxy | =1.5.1-pre1 | |
Tinyproxy | =1.6.0-rc3 | |
Tinyproxy | =1.5.0-rc2 | |
Tinyproxy | =1.5.1-rc2 | |
Tinyproxy | =1.5.2-rc2 | |
Tinyproxy | =1.6.3 | |
Tinyproxy | =1.5.1-rc1 | |
Tinyproxy | =1.8.1 | |
Tinyproxy | =1.5.0-rc5 | |
Tinyproxy | =1.5.0-rc4 | |
Tinyproxy | =1.5.1-pre3 | |
Tinyproxy | =1.5.1-pre4 | |
Tinyproxy | =1.6.0-rc1 | |
Tinyproxy | <=1.8.2 | |
Tinyproxy | =1.6.0 | |
Tinyproxy | =1.5.0-pre4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-1843 is categorized as medium due to its potential exploitation to bypass access restrictions.
To fix CVE-2011-1843, upgrade Tinyproxy to version 1.8.3 or later, where this vulnerability is patched.
CVE-2011-1843 affects Tinyproxy versions prior to 1.8.3, specifically versions including and below 1.7.2.
Yes, CVE-2011-1843 can be exploited remotely through a TCP connection that manipulates invalid port numbers.
CVE-2011-1843 is classified as an integer overflow vulnerability, leading to unintended behavior in access control.