First published: Thu Dec 23 2021(Updated: )
A vulnerability was found in Privoxy which was fixed in process_encrypted_request_headers() by freeing header memory when failing to get the request destination.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Privoxy Privoxy | <3.0.33 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44541 is high with a severity value of 7.5.
CVE-2021-44541 affects Privoxy versions up to and excluding 3.0.33.
CVE-2021-44541 could allow attackers to cause a denial of service or possibly execute arbitrary code.
CVE-2021-44541 was fixed in Privoxy by freeing header memory when failing to get the request destination.
More information about CVE-2021-44541 can be found at the following references: [1](https://www.privoxy.org/3.0.33/user-manual/whatsnew.html) and [2](https://www.privoxy.org/gitweb/?p=privoxy.git;a=commit;h=652b4b7cb0).