
Cloud Vulnerability DB
A community-led vulnerabilities database
A memory leak vulnerability (CVE-2021-20210) was discovered in Privoxy versions before 3.0.29. The vulnerability specifically affects the show-status CGI handler when no filter files are configured, potentially leading to a system crash (Privoxy Manual, NVD). The issue was discovered and disclosed in early 2021, affecting multiple versions of the Privoxy web proxy software.
The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (High), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is characterized by its network attack vector, low attack complexity, and requires no privileges or user interaction. While it doesn't impact confidentiality or integrity, it has a high impact on availability (NVD).
The primary impact of this vulnerability is on system availability. When exploited, the memory leak in the show-status CGI handler can lead to resource exhaustion and ultimately result in a system crash. This creates a potential denial of service condition for affected systems (Gentoo Advisory, Ubuntu Security).
The vulnerability was fixed in Privoxy version 3.0.29. Users of affected versions should upgrade to version 3.0.29 or later to mitigate the risk. Multiple Linux distributions have released security updates to address this vulnerability, including Ubuntu, Gentoo, and Red Hat (Privoxy Manual, Ubuntu Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."