A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: talos
Published: 2024-05-01T15:31:01.499Z
Updated: 2024-08-02T22:01:25.811Z
Reserved: 2023-12-05T17:05:52.210Z
Link: CVE-2023-49606
Vulnrichment
Updated: 2024-08-02T22:01:25.811Z
NVD
Status : Awaiting Analysis
Published: 2024-05-01T16:15:07.257
Modified: 2024-05-07T12:15:09.413
Link: CVE-2023-49606
Redhat
No data.