Launchpad has imported 7 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=849368.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2012-08-18T21:54:05+00:00 Kurt wrote: gpernot reports: Bug 110 - algorithmic complexity denial of service randomized hashmaps to prevent DOS attacks hashmap are not randomized, so that it is possible to forge fake headers that will always go into the same bucket. try 'curl http://78.230.4.96/hashes.asis' via tinyproxy and without it to convince you (~8 MB of headers). I'll remove this url as soon as bug is accepted... attached patch should solve this. it's certainly perfectible, though (autoconf for time() and rand() are missing...). even with this patch, it takes ages. maybe headers should be sanitized before hiting the buckets... Created attachment 60 [details] limit number of headers to prevent DoS attacks External references: https://banu.com/bugzilla/show_bug.cgi?id=110#c2 https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985 Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/8 ------------------------------------------------------------------------ On 2012-08-18T21:55:06+00:00 Kurt wrote: Created tinyproxy tracking bugs for this issue Affects: fedora-all [bug 849369] Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/9 ------------------------------------------------------------------------ On 2012-08-18T21:56:32+00:00 Kurt wrote: Created tinyproxy tracking bugs for this issue Affects: epel-all [bug 849370] Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/10 ------------------------------------------------------------------------ On 2012-08-18T21:56:51+00:00 Kurt wrote: Created attachment 605402 CVE-2012-3505-tinyproxy-limit-headers.patch Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/11 ------------------------------------------------------------------------ On 2012-08-18T21:57:11+00:00 Kurt wrote: Created attachment 605403 CVE-2012-3505-tinyproxy-randomized-hashmaps.patch Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/12 ------------------------------------------------------------------------ On 2014-12-13T01:10:29+00:00 Michael wrote: Believe it or not: Fixes pushed to upstream and will be released soon with Tinyproxy 1.8.4. Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/21 ------------------------------------------------------------------------ On 2016-01-02T00:09:15+00:00 Michael wrote: Upstream release including fix available at https://github.com/tinyproxy/tinyproxy/releases/tag/1.8.4 (Note: upstream hosting is currently changing.) Reply at: https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985/comments/23 ** Changed in: tinyproxy (Fedora) Status: Unknown => Confirmed ** Changed in: tinyproxy (Fedora) Importance: Unknown => Low -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1036985 Title: denial of service of too many headers in response To manage notifications about this bug go to: https://bugs.launchpad.net/tinyproxy/+bug/1036985/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
