TROYANOSYVIRUS
Voltar para CVEs

CVE-2026-3945

HIGH
7.5

Descricao

An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.

Detalhes CVE

Pontuacao CVSS v3.17.5
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado3/30/2026
Ultima modificacao3/30/2026
Fontenvd
Avistamentos honeypot0

Fraquezas (CWE)

CWE-190

Referencias

https://github.com/tinyproxy/tinyproxy/commit/969852c(309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c)
https://github.com/tinyproxy/tinyproxy/commit/bb7edc4(309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c)
https://github.com/tinyproxy/tinyproxy/issues/602(309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c)
https://github.com/tinyproxy/tinyproxy/pull/603(309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c)
https://github.com/tinyproxy/tinyproxy/releases(309f9ea4-e3e9-4c6c-b79d-e8eb01244f2c)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.