** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1, when NDEBUG is omitted, allows denial of service via a reachable assertion during parsing of a malformed Range header. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2021/07/18/1 | Mailing List Third Party Advisory | 
| https://bugs.gentoo.org/755896 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/jech/polipo/commit/4d42ca1b5849518762d110f34b6ce2e03d6df9ec | Patch Third Party Advisory | 
| https://www.openwall.com/lists/oss-security/2020/11/18/1 | Exploit Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2021/07/18/1 | Mailing List Third Party Advisory | 
| https://bugs.gentoo.org/755896 | Exploit Issue Tracking Patch Third Party Advisory | 
| https://github.com/jech/polipo/commit/4d42ca1b5849518762d110f34b6ce2e03d6df9ec | Patch Third Party Advisory | 
| https://www.openwall.com/lists/oss-security/2020/11/18/1 | Exploit Mailing List Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 05:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2021/07/18/1 - Mailing List, Third Party Advisory | |
| References | () https://bugs.gentoo.org/755896 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | () https://github.com/jech/polipo/commit/4d42ca1b5849518762d110f34b6ce2e03d6df9ec - Patch, Third Party Advisory | |
| References | () https://www.openwall.com/lists/oss-security/2020/11/18/1 - Exploit, Mailing List, Third Party Advisory | 
20 Sep 2021, 12:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 4.3 v3 : 7.5 | 
12 Aug 2021, 23:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | ** UNSUPPORTED WHEN ASSIGNED ** Polipo through 1.1.1, when NDEBUG is omitted, allows denial of service via a reachable assertion during parsing of a malformed Range header. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | 
20 Jul 2021, 13:56
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | |
| References | (MISC) https://github.com/jech/polipo/commit/4d42ca1b5849518762d110f34b6ce2e03d6df9ec - Patch, Third Party Advisory | |
| References | (MISC) https://bugs.gentoo.org/755896 - Exploit, Issue Tracking, Patch, Third Party Advisory | |
| References | (MISC) https://www.openwall.com/lists/oss-security/2020/11/18/1 - Exploit, Mailing List, Third Party Advisory | |
| CPE | cpe:2.3:a:polipo_project:polipo:*:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 7.5 | 
| CWE | CWE-617 | 
15 Jul 2021, 00:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2021-07-15 00:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36420
Mitre link : CVE-2020-36420
CVE.ORG link : CVE-2020-36420
JSON object : View
Products Affected
                polipo_project
- polipo
CWE
                
                    
                        
                        CWE-617
                        
            Reachable Assertion
