Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.

Bug 1185922 (CVE-2015-1380)

Summary: CVE-2015-1380 privoxy: denial of service in case of client requests with incorrect chunk-encoded body
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: carnil, gwync, jrusnack, karsten
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Privoxy 3.0.23 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-03-19 10:15:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1185925, 1185926    
Bug Blocks:    

Description Vasyl Kaigorodov 2015-01-26 16:02:28 UTC
It was reported [1] that Privoxy 3.0.23 contains fixes for the following security issues:

- Fixed a DoS issue in case of client requests with incorrect
  chunk-encoded body. When compiled with assertions enabled
  (the default) they could previously cause Privoxy to abort().
  Reported by Matthew Daley.
  http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/jcc.c?r1=1.433&r2=1.434

- Fixed multiple segmentation faults and memory leaks in the
  pcrs code. This fix also increases the chances that an invalid
  pcrs command is rejected as such. Previously some invalid commands
  would be loaded without error. Note that Privoxy's pcrs sources
  (action and filter files) are considered trustworthy input and
  should not be writable by untrusted third-parties.
  http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/pcrs.c?r1=1.46&r2=1.47

- Fixed an 'invalid read' bug which could at least theoretically
  cause Privoxy to crash.
  http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.297&r2=1.298

[1]: http://seclists.org/oss-sec/2015/q1/259

Comment 1 Vasyl Kaigorodov 2015-01-26 16:05:28 UTC
Created privoxy tracking bugs for this issue:

Affects: fedora-all [bug 1185925]
Affects: epel-all [bug 1185926]

Comment 2 Martin Prpič 2015-01-28 10:21:38 UTC
CVE assignments per http://seclists.org/oss-sec/2015/q1/285:

> - Fixed a DoS issue in case of client requests with incorrect
>   chunk-encoded body. When compiled with assertions enabled
>   (the default) they could previously cause Privoxy to abort().
>   Reported by Matthew Daley.
>  
> http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/jcc.c?r1=1.433&r2=1.
> 434

CVE-2015-1380

> 
> - Fixed multiple segmentation faults and memory leaks in the
>   pcrs code. This fix also increases the chances that an invalid
>   pcrs command is rejected as such. Previously some invalid commands
>   would be loaded without error. Note that Privoxy's pcrs sources
>   (action and filter files) are considered trustworthy input and
>   should not be writable by untrusted third-parties.
>  
> http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/pcrs.c?r1=1.46&r2=1.
> 47

CVE-2015-1381

> 
> - Fixed an 'invalid read' bug which could at least theoretically
>   cause Privoxy to crash.
>  
> http://ijbswa.cvs.sourceforge.net/viewvc/ijbswa/current/parsers.c?r1=1.
> 297&r2=1.298

CVE-2015-1382

Comment 3 Vasyl Kaigorodov 2015-03-18 13:07:44 UTC
CVE-2015-1381 has been split to https://bugzilla.redhat.com/1203246
CVE-2015-1382 has been split to https://bugzilla.redhat.com/1203248