CVE-2011-1499

Current Description

acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.

Basic Data

PublishedApril 29, 2011
Last ModifiedAugust 17, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-16
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:H/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityHIGH
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score2.6
SeverityLOW
Exploitability Score4.9
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationBanuTinyproxy1.5.0*******
    2.3ApplicationBanuTinyproxy1.5.0pre1******
    2.3ApplicationBanuTinyproxy1.5.0pre2******
    2.3ApplicationBanuTinyproxy1.5.0pre3******
    2.3ApplicationBanuTinyproxy1.5.0pre4******
    2.3ApplicationBanuTinyproxy1.5.0pre5******
    2.3ApplicationBanuTinyproxy1.5.0pre6******
    2.3ApplicationBanuTinyproxy1.5.0rc1******
    2.3ApplicationBanuTinyproxy1.5.0rc10******
    2.3ApplicationBanuTinyproxy1.5.0rc2******
    2.3ApplicationBanuTinyproxy1.5.0rc4******
    2.3ApplicationBanuTinyproxy1.5.0rc5******
    2.3ApplicationBanuTinyproxy1.5.0rc6******
    2.3ApplicationBanuTinyproxy1.5.0rc7******
    2.3ApplicationBanuTinyproxy1.5.0rc8******
    2.3ApplicationBanuTinyproxy1.5.0rc9******
    2.3ApplicationBanuTinyproxy1.5.1*******
    2.3ApplicationBanuTinyproxy1.5.1pre1******
    2.3ApplicationBanuTinyproxy1.5.1pre2******
    2.3ApplicationBanuTinyproxy1.5.1pre3******
    2.3ApplicationBanuTinyproxy1.5.1pre4******
    2.3ApplicationBanuTinyproxy1.5.1pre5******
    2.3ApplicationBanuTinyproxy1.5.1pre6******
    2.3ApplicationBanuTinyproxy1.5.1rc1******
    2.3ApplicationBanuTinyproxy1.5.1rc2******
    2.3ApplicationBanuTinyproxy1.5.1rc3******
    2.3ApplicationBanuTinyproxy1.5.1rc4******
    2.3ApplicationBanuTinyproxy1.5.2*******
    2.3ApplicationBanuTinyproxy1.5.2rc1******
    2.3ApplicationBanuTinyproxy1.5.2rc2******
    2.3ApplicationBanuTinyproxy1.5.3*******
    2.3ApplicationBanuTinyproxy1.5.3rc1******
    2.3ApplicationBanuTinyproxy1.6.0*******
    2.3ApplicationBanuTinyproxy1.6.0a******
    2.3ApplicationBanuTinyproxy1.6.0pre1******
    2.3ApplicationBanuTinyproxy1.6.0pre2******
    2.3ApplicationBanuTinyproxy1.6.0pre3******
    2.3ApplicationBanuTinyproxy1.6.0pre4******
    2.3ApplicationBanuTinyproxy1.6.0rc1******
    2.3ApplicationBanuTinyproxy1.6.0rc2******
    2.3ApplicationBanuTinyproxy1.6.0rc3******
    2.3ApplicationBanuTinyproxy1.6.1*******
    2.3ApplicationBanuTinyproxy1.6.2*******
    2.3ApplicationBanuTinyproxy1.6.3*******
    2.3ApplicationBanuTinyproxy1.6.4*******
    2.3ApplicationBanuTinyproxy1.6.5*******
    2.3ApplicationBanuTinyproxy1.7.0*******
    2.3ApplicationBanuTinyproxy1.7.1*******
    2.3ApplicationBanuTinyproxy1.8.0*******
    2.3ApplicationBanuTinyproxy1.8.1*******
    2.3ApplicationBanuTinyproxy********1.8.2
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSDebianDebian Linux6.0*******

Vulnerable Software List

VendorProductVersions
Debian Debian Linux 6.0
Banu Tinyproxy *, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.6.5, 1.7.0, 1.7.1, 1.8.0, 1.8.1

References

NameSourceURLTags
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=621493CONFIRMIssue Tracking Patch
[oss-security] 20110407 CVE request: tinyproxy runs as an open proxy when attempting to restrict allowable IP rangeshttp://openwall.com/lists/oss-security/2011/04/07/9MLISTMailing List Third Party Advisory
[oss-security] 20110408 Re: CVE request: tinyproxy runs as an open proxy when attempting to restrict allowable IP rangeshttp://openwall.com/lists/oss-security/2011/04/08/3MLISTMailing List Third Party Advisory
44274http://secunia.com/advisories/44274SECUNIA
DSA-2222http://www.debian.org/security/2011/dsa-2222DEBIANThird Party Advisory
https://banu.com/bugzilla/show_bug.cgi?id=90https://banu.com/bugzilla/show_bug.cgi?id=90CONFIRMBroken Link
https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4https://banu.com/cgit/tinyproxy/diff/?id=e8426f6662dc467bd1d827100481b95d9a4a23e4CONFIRMBroken Link
https://bugzilla.redhat.com/show_bug.cgi?id=694658https://bugzilla.redhat.com/show_bug.cgi?id=694658CONFIRMIssue Tracking Patch
tinyproxy-aclc-sec-bypass(67256)https://exchange.xforce.ibmcloud.com/vulnerabilities/67256XF