CVE Vulnerabilities

CVE-2022-40468

Insecure Default Initialization of Resource

Published: Sep 19, 2022 | Modified: May 21, 2023
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Potential leak of left-over heap data if custom error page templates containing special non-standard variables are used. Tinyproxy commit 84f203f and earlier use uninitialized buffers in process_request() function.

Weakness

The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.

Affected Software

Name Vendor Start Version End Version
Tinyproxy Tinyproxy_project * 1.11.1 (including)
Tinyproxy Ubuntu bionic *
Tinyproxy Ubuntu esm-apps/bionic *
Tinyproxy Ubuntu esm-apps/jammy *
Tinyproxy Ubuntu esm-apps/xenial *
Tinyproxy Ubuntu focal *
Tinyproxy Ubuntu kinetic *
Tinyproxy Ubuntu lunar *
Tinyproxy Ubuntu mantic *
Tinyproxy Ubuntu trusty *
Tinyproxy Ubuntu upstream *
Tinyproxy Ubuntu xenial *

Extended Description

Developers often choose default values that leave the product as open and easy to use as possible out-of-the-box, under the assumption that the administrator can (or should) change the default value. However, this ease-of-use comes at a cost when the default is insecure and the administrator does not change it.

References