Debian Security Advisory

DSA-018-1 tinyproxy -- remote nobody exploit

Date Reported:
23 Jan 2001
Affected Packages:
tinyproxy
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 2217.
In Mitre's CVE dictionary: CVE-2001-0129.
More information:
PkC have found a heap overflow in tinyproxy that could be remotely exploited. An attacker could gain a shell (user nobody) remotely.

We recommend you upgrade your tinyproxy package immediately.

Fixed in:

Debian 2.2 (potato)

Source:
http://security.debian.org/dists/stable/updates/main/source/tinyproxy_1.3.1-2.diff.gz
http://security.debian.org/dists/stable/updates/main/source/tinyproxy_1.3.1-2.dsc
http://security.debian.org/dists/stable/updates/main/source/tinyproxy_1.3.1.orig.tar.gz
alpha:
http://security.debian.org/dists/stable/updates/main/binary-alpha/tinyproxy_1.3.1-2_alpha.deb
arm:
http://security.debian.org/dists/stable/updates/main/binary-arm/tinyproxy_1.3.1-2_arm.deb
i386:
http://security.debian.org/dists/stable/updates/main/binary-i386/tinyproxy_1.3.1-2_i386.deb
m68k:
http://security.debian.org/dists/stable/updates/main/binary-m68k/tinyproxy_1.3.1-2_m68k.deb
powerpc:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/tinyproxy_1.3.1-2_powerpc.deb
sparc:
http://security.debian.org/dists/stable/updates/main/binary-sparc/tinyproxy_1.3.1-2_sparc.deb