-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2564-1 security@debian.org http://www.debian.org/security/ Thijs Kinkhorst October 23, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : tinyproxy Vulnerability : denial of service Problem type : remote Debian-specific: no CVE ID : CVE-2012-3505 Debian Bug : 685281 gpernot discovered that Tinyproxy, a HTTP proxy, is vulnerable to a denial of service by remote attackers by sending crafted request headers. For the stable distribution (squeeze), this problem has been fixed in version 1.8.2-1squeeze3. For the testing distribution (wheezy), this problem has been fixed in version 1.8.3-3. For the unstable distribution (sid), this problem has been fixed in version 1.8.3-3. We recommend that you upgrade your tinyproxy packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJQhs7pAAoJEFb2GnlAHawErvsIAJaaJhyFq3oQmZ8gwH08KdN4 XbQCFjjtIdouFytvS7+b9DMCZGVYUvZVvjCE3KZ+A6OiHPDK8LRuwKcVFt8oNwZ3 dZXrtdRXMtL1VP0Yu0q3odU1y9VqsdIN/hRFJu6J2q3rCvOMEuciK5AjS0CzzaIA 7KfZBxZ4rlf0ldTlKUK1ygx92c5hz+SfGJwsX3GD0NyqMJJhsbAS4SHrWA+KMJEh wwtRU6zMAFfStQbmS65q1l4mxVnjksNYbvZirtvoZ23LslzRlzbpTx2SM31qmmN+ 5k2H8lDTU1lqktSDMWIGJsjsMqEdY1W+9dDuQfggVxXeWP/XSlzxtcFCMntNuZI= =FzL0 -----END PGP SIGNATURE-----