DEBIAN-CVE-2011-1499

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2011-1499
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2011-1499.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2011-1499
Upstream
Published
2011-04-29T22:55:00Z
Modified
2025-09-19T06:27:59Z
Summary
[none]
Details

acl.c in Tinyproxy before 1.8.3, when an Allow configuration setting specifies a CIDR block, permits TCP connections from all IP addresses, which makes it easier for remote attackers to hide the origin of web traffic by leveraging the open HTTP proxy server.

References

Affected packages

Debian:11 / tinyproxy

Package

Name
tinyproxy
Purl
pkg:deb/debian/tinyproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / tinyproxy

Package

Name
tinyproxy
Purl
pkg:deb/debian/tinyproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / tinyproxy

Package

Name
tinyproxy
Purl
pkg:deb/debian/tinyproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / tinyproxy

Package

Name
tinyproxy
Purl
pkg:deb/debian/tinyproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.2-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}