First published: Tue Feb 10 2015(Updated: )
Multiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Privoxy | <=3.0.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-1031 is not explicitly rated, but it involves multiple use-after-free vulnerabilities that could lead to remote attacks.
To fix CVE-2015-1031, upgrade Privoxy to version 3.0.22 or later, as this version addresses the identified vulnerabilities.
Privoxy versions prior to 3.0.22 are affected by CVE-2015-1031.
CVE-2015-1031 describes multiple use-after-free vulnerabilities in Privoxy.
CVE-2015-1031 may allow remote attackers to exploit the vulnerabilities, potentially leading to arbitrary code execution.