A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3892-1 | tinyproxy security update |
Debian DSA |
DSA-5705-1 | tinyproxy security update |
Ubuntu USN |
USN-7190-1 | Tinyproxy vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 04 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tinyproxy:tinyproxy:1.10.0:*:*:*:*:*:*:* cpe:2.3:a:tinyproxy:tinyproxy:1.11.1:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Fri, 22 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tinyproxy Project
Tinyproxy Project tinyproxy |
|
| CPEs | cpe:2.3:a:tinyproxy_project:tinyproxy:1.10.0:*:*:*:*:*:*:* cpe:2.3:a:tinyproxy_project:tinyproxy:1.11.1:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tinyproxy Project
Tinyproxy Project tinyproxy |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T17:13:21.882Z
Reserved: 2023-12-05T17:05:52.210Z
Link: CVE-2023-49606
Updated: 2025-11-04T17:13:21.882Z
Status : Modified
Published: 2024-05-01T16:15:07.257
Modified: 2025-11-04T18:15:44.593
Link: CVE-2023-49606
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:31:49Z
Debian DLA
Debian DSA
Ubuntu USN