Launchpad has imported 7 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=849368.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2012-08-18T21:54:05+00:00 Kurt wrote:


gpernot reports:

Bug 110 - algorithmic complexity denial of service

randomized hashmaps to prevent DOS attacks

hashmap are not randomized, so that it is possible to forge fake headers that 
will always go into the same bucket. 
try 'curl http://78.230.4.96/hashes.asis' via tinyproxy and without it to 
convince you (~8 MB of headers). I'll remove this url as soon as bug is 
accepted...

attached patch should solve this. it's certainly perfectible, though 
(autoconf for time() and rand() are missing...).

even with this patch, it takes ages. maybe headers should be sanitized before 
hiting the buckets...

Created attachment 60 [details]
limit number of headers to prevent DoS attacks

External references:
https://banu.com/bugzilla/show_bug.cgi?id=110#c2
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/8

------------------------------------------------------------------------
On 2012-08-18T21:55:06+00:00 Kurt wrote:

Created tinyproxy tracking bugs for this issue

Affects: fedora-all [bug 849369]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/9

------------------------------------------------------------------------
On 2012-08-18T21:56:32+00:00 Kurt wrote:

Created tinyproxy tracking bugs for this issue

Affects: epel-all [bug 849370]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/10

------------------------------------------------------------------------
On 2012-08-18T21:56:51+00:00 Kurt wrote:

Created attachment 605402
CVE-2012-3505-tinyproxy-limit-headers.patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/11

------------------------------------------------------------------------
On 2012-08-18T21:57:11+00:00 Kurt wrote:

Created attachment 605403
CVE-2012-3505-tinyproxy-randomized-hashmaps.patch

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/12

------------------------------------------------------------------------
On 2014-12-13T01:10:29+00:00 Michael wrote:

Believe it or not:
Fixes pushed to upstream and will be released soon with Tinyproxy 1.8.4.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/21

------------------------------------------------------------------------
On 2016-01-02T00:09:15+00:00 Michael wrote:

Upstream release including fix available at

https://github.com/tinyproxy/tinyproxy/releases/tag/1.8.4

(Note: upstream hosting is currently changing.)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/23


** Changed in: tinyproxy (Fedora)
       Status: Unknown => Confirmed

** Changed in: tinyproxy (Fedora)
   Importance: Unknown => Low

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1036985

Title:
  denial of service of too many headers in response

To manage notifications about this bug go to:
https://bugs.launchpad.net/tinyproxy/+bug/1036985/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to