Vulnerability Name: | CVE-2015-1030 (CCN-99972) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-01-07 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2015-01-07 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2015-02-04 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Memory leak in the rfc2553_connect_to function in jbsocket.c in Privoxy before 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of requests that are rejected because the socket limit is reached. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-399 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-1030 Source: CCN Type: oss-security Mailing List, Sat, 10 Jan 2015 21:05:12 -0500 (EST) Re: CVE Request for Privoxy Version: 3.0.22 Source: CCN Type: oss-security Mailing List, Wed, 7 Jan 2015 19:40:12 -0500 CVE Request for Privoxy Version: 3.0.22 Source: SECUNIA Type: UNKNOWN 62123 Source: MLIST Type: UNKNOWN [oss-security] 20150110 Re: CVE Request for Privoxy Version: 3.0.22 Source: CCN Type: Privoxy Web site Privoxy - Home Page Source: CONFIRM Type: Patch, Vendor Advisory http://www.privoxy.org/announce.txt Source: CCN Type: BID-71991 Privoxy CVE-2015-1030 Memory Leak Information Disclosure Vulnerability Source: XF Type: UNKNOWN privoxy-cve20151030-dos(99972) Source: CCN Type: WhiteSource Vulnerability Database CVE-2015-1030 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |