Multiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://secunia.com/advisories/62123 | |
http://www.debian.org/security/2015/dsa-3133 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/01/11/1 | |
http://www.privoxy.org/announce.txt | Patch Vendor Advisory |
http://secunia.com/advisories/62123 | |
http://www.debian.org/security/2015/dsa-3133 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2015/01/11/1 | |
http://www.privoxy.org/announce.txt | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/62123 - | |
References | () http://www.debian.org/security/2015/dsa-3133 - Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/01/11/1 - | |
References | () http://www.privoxy.org/announce.txt - Patch, Vendor Advisory |
Information
Published : 2015-02-10 19:59
Updated : 2024-11-21 02:24
NVD link : CVE-2015-1031
Mitre link : CVE-2015-1031
CVE.ORG link : CVE-2015-1031
JSON object : View
Products Affected
privoxy
- privoxy
CWE