Use After Free Affecting tinyproxy package, versions <1.11.2-r0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-ALPINE316-TINYPROXY-6825845
  • published9 May 2024
  • disclosed1 May 2024

Introduced: 1 May 2024

CVE-2023-49606  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade Alpine:3.16 tinyproxy to version 1.11.2-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tinyproxy package and not the tinyproxy package as distributed by Alpine. See How to fix? for Alpine:3.16 relevant fixed versions and status.

A use-after-free vulnerability exists in the HTTP Connection Headers parsing in Tinyproxy 1.11.1 and Tinyproxy 1.10.0. A specially crafted HTTP header can trigger reuse of previously freed memory, which leads to memory corruption and could lead to remote code execution. An attacker needs to make an unauthenticated HTTP request to trigger this vulnerability.

CVSS Scores

version 3.1