Vulnerability Details : CVE-2012-3505
Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
Vulnerability category: Denial of service
Threat overview for CVE-2012-3505
Top countries where our scanners detected CVE-2012-3505
Top open port discovered on systems with this issue
80
IPs affected by CVE-2012-3505 55,847
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-3505!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-3505
Probability of exploitation activity in the next 30 days: 2.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-3505
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2012-3505
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-3505
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281
#685281 - denial of service via many headers - Debian Bug report logs
-
https://banu.com/bugzilla/show_bug.cgi?id=110
-
http://www.securitytracker.com/id?1027412
Tinyproxy Hashmap Collision Lets Remote Users Deny Service - SecurityTracker
-
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985
Bug #1036985 “denial of service of too many headers in response” : Bugs : tinyproxy package : Ubuntu
-
http://www.openwall.com/lists/oss-security/2012/08/18/1
oss-security - Re: CVE request: tinyproxy
-
http://www.openwall.com/lists/oss-security/2012/08/17/3
oss-security - CVE request: tinyproxy
-
http://www.debian.org/security/2012/dsa-2564
Debian -- Security Information -- DSA-2564-1 tinyproxy
-
https://banu.com/bugzilla/show_bug.cgi?id=110#c2
Products affected by CVE-2012-3505
- cpe:2.3:a:banu:tinyproxy:*:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:a:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:rc4:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:pre4:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre4:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre5:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre6:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc8:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc9:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre5:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre6:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc10:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.6.0:pre3:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:pre3:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.0:rc7:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre3:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.1:pre4:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.5.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:banu:tinyproxy:1.8.2:*:*:*:*:*:*:*