jcc.c in Privoxy before 3.0.23 allows remote attackers to cause a denial of service (abort) via a crafted chunk-encoded body.
References
Link | Resource |
---|---|
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/ChangeLog?revision=1.197&view=markup | Release Notes Third Party Advisory |
http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/currentjcc.c/?r1=1.433&r2=1.434 | Broken Link |
http://lists.opensuse.org/opensuse-updates/2015-02/msg00031.html | Third Party Advisory |
http://secunia.com/advisories/62899 | Permissions Required Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/01/26/4 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2015/01/27/20 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | Third Party Advisory |
http://www.securityfocus.com/bid/72355 |
Configurations
History
No history.
Information
Published : 2015-02-03 16:59
Updated : 2024-02-04 18:35
NVD link : CVE-2015-1380
Mitre link : CVE-2015-1380
CVE.ORG link : CVE-2015-1380
JSON object : View
Products Affected
privoxy
- privoxy
oracle
- solaris
opensuse
- opensuse
CWE
CWE-20
Improper Input Validation