First published: Mon Feb 15 2021(Updated: )
A flaw was found in Privoxy in versions before 3.0.29. Dereference of a NULL-pointer that could result in a crash if accept-intercepted-requests was enabled, Privoxy failed to get the request destination from the Host header and a memory allocation failed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Privoxy | <3.0.29 | 3.0.29 |
Privoxy Privoxy | <3.0.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20213 is a vulnerability found in Privoxy versions before 3.0.29 that could result in a crash if certain conditions are met.
The severity of CVE-2021-20213 is high, with a CVSS v3.1 base score of 7.5.
CVE-2021-20213 affects Privoxy versions before 3.0.29 by causing a crash due to a NULL-pointer dereference.
To fix CVE-2021-20213, update Privoxy to version 3.0.29 or later, which addresses the vulnerability.
You can find more information about CVE-2021-20213 in the references provided: [Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=1928739), [Gentoo GLSA](https://security.gentoo.org/glsa/202107-16), and [Privoxy User Manual](https://www.privoxy.org/3.0.29/user-manual/whatsnew.html).