Polipo 1.0.4, and possibly other versions, allows remote attackers to cause a denial of service (crash) via a request with a Cache-Control header that lacks a value for the max-age field, which triggers a segmentation fault in the httpParseHeaders function in http_parse.c, and possibly other unspecified vectors.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/37463 | vdb entry |
http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/dca6877a8117f0df | |
http://secunia.com/advisories/38647 | third party advisory |
http://secunia.com/advisories/37607 | third party advisory vendor advisory |
http://www.debian.org/security/2010/dsa-2002 | vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547047 |