CVE-2026-3945

| EUVD-2026-17066 HIGH
2026-03-30 TuranSec GHSA-6vhj-8f7g-v7f7
8.7
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Analysis Generated
Mar 30, 2026 - 07:30 vuln.today
EUVD ID Assigned
Mar 30, 2026 - 07:30 euvd
EUVD-2026-17066
Patch Released
Mar 30, 2026 - 07:30 nvd
Patch available
CVE Published
Mar 30, 2026 - 07:05 nvd
HIGH 8.7

Description

An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen < 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.

Analysis

Remote denial of service in tinyproxy versions through 1.11.3 allows unauthenticated attackers to exhaust all proxy worker connections via malformed HTTP chunked transfer encoding. An integer overflow in chunk size parsing (using strtol() without ERANGE validation) enables attackers to send LONG_MAX values that bypass size checks and trigger arithmetic overflow during chunklen+2 calculations. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: inventory all tinyproxy deployments and document affected versions (1.11.3 and earlier). Within 7 days: upgrade to patched version (post-1.11.3 release containing commits bb7edc4 and 969852c) or apply vendor-provided security patches; test in non-production environment first. …

Sign in for detailed remediation steps.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +44
POC: 0

Vendor Status

Debian

tinyproxy
Release Status Fixed Version Urgency
bullseye vulnerable 1.10.0-5 -
bullseye (security) vulnerable 1.10.0-5+deb11u1 -
bookworm, bookworm (security) vulnerable 1.11.1-2.1+deb12u1 -
trixie vulnerable 1.11.2-1 -
forky, sid vulnerable 1.11.3-1 -
(unstable) fixed (unfixed) -

Share

CVE-2026-3945 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy