denial of service of too many headers in response
Bug #1036985 reported by
Guillaume Pernot
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
tinyproxy |
Confirmed
|
High
|
|||
tinyproxy (Debian) |
Fix Released
|
Unknown
|
|||
tinyproxy (Fedora) |
Confirmed
|
Low
|
|||
tinyproxy (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Precise |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
can DoS tinyproxy with too many headers in response.
see https:/
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: tinyproxy (not installed)
ProcVersionSign
Uname: Linux 3.2.0-29-generic x86_64
NonfreeKernelMo
ApportVersion: 2.0.1-0ubuntu12
Architecture: amd64
Date: Wed Aug 15 09:28:26 2012
ProcEnviron:
TERM=xterm
PATH=(custom, no user)
LANG=fr_FR.UTF-8
SHELL=/bin/bash
SourcePackage: tinyproxy
UpgradeStatus: No upgrade log present (probably fresh install)
CVE References
Changed in tinyproxy (Ubuntu): | |
status: | Incomplete → Confirmed |
Changed in tinyproxy: | |
importance: | Unknown → High |
status: | Unknown → Confirmed |
Changed in tinyproxy (Debian): | |
status: | Unknown → Fix Released |
Changed in tinyproxy (Fedora): | |
importance: | Unknown → Low |
status: | Unknown → Confirmed |
To post a comment you must log in.
Created attachment 59
randomized hashmaps to prevent DOS attacks
hashmap are not randomized, so that it is possible to forge fake headers that will always go into the same bucket. 78.230. 4.96/hashes. asis' via tinyproxy and without it to convince you (~8 MB of headers). I'll remove this url as soon as bug is accepted...
try 'curl http://
attached patch should solve this. it's certainly perfectible, though (autoconf for time() and rand() are missing...).