A flaw was found in privoxy before 3.0.32. A crash may occur due a NULL-pointer dereference when the socks server misbehaves.
The product dereferences a pointer that it expects to be valid but is NULL.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Privoxy | Privoxy | * | 3.0.32 (excluding) |
Privoxy | Ubuntu | trusty | * |
Privoxy | Ubuntu | upstream | * |