#VU45103 Configuration in tinyproxy and Debian Linux - CVE-2011-1499


| Updated: 2020-08-11

Vulnerability identifier: #VU45103

Vulnerability risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2011-1499

CWE-ID: CWE-16

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
tinyproxy
Other software / Other software solutions
Debian Linux
Operating systems & Components / Operating system

Vendor: tinyproxy
Debian

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.

Mitigation
Install update from vendor's website.

Vulnerable software versions

tinyproxy: 1.5.0 - 1.8.1

Debian Linux: 1.5.0 - 6.0


External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493
https://openwall.com/lists/oss-security/2011/04/07/9
https://openwall.com/lists/oss-security/2011/04/08/3
https://secunia.com/advisories/44274
https://www.debian.org/security/2011/dsa-2222
https://banu.com/bugzilla/show_bug.cgi?id=90
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4
https://bugzilla.redhat.com/show_bug.cgi?id=694658
https://exchange.xforce.ibmcloud.com/vulnerabilities/67256


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.