ArchLinux: 201501-11: tinyproxy: denial of service
Summary
It was discovered that a remote attacker is able to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that predictably trigger hash collisions.
Resolution
Upgrade to 1.8.4-1.
# pacman -Syu "tinyproxy>=1.8.4-1"
The problem has been fixed upstream in version 1.8.4.
References
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3505 https://bugs.archlinux.org/task/38400
Workaround
None.