ID CVE-2015-1031
Summary Multiple use-after-free vulnerabilities in Privoxy before 3.0.22 allow remote attackers to have unspecified impact via vectors related to (1) the unmap function in list.c or (2) "two additional unconfirmed use-after-free complaints made by Coverity scan." NOTE: some of these details are obtained from third party information. <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
References
Vulnerable Configurations
  • cpe:2.3:a:privoxy:privoxy:2.9.20:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:2.9.20:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.12:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.12:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.13:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.13:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.14:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.14:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.15:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.15:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.16:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.16:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.17:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.17:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.18:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.18:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.19:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.19:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.20:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.20:*:*:*:*:*:*:*
  • cpe:2.3:a:privoxy:privoxy:3.0.21:*:*:*:*:*:*:*
    cpe:2.3:a:privoxy:privoxy:3.0.21:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 04-03-2015 - 19:10)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
confirm http://www.privoxy.org/announce.txt
debian DSA-3133
mlist [oss-security] 20150110 Re: CVE Request for Privoxy Version: 3.0.22
secunia 62123
Last major update 04-03-2015 - 19:10
Published 10-02-2015 - 19:59
Last modified 04-03-2015 - 19:10
Back to Top