
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2021-20217) was discovered in Privoxy versions before 3.0.31, where an assertion failure triggered by a crafted CGI request could lead to denial of service. The vulnerability was reported on December 17, 2020, and affects the Privoxy web proxy software, which is known for its advanced filtering capabilities for enhancing privacy (CVE Mitre, Red Hat Bugzilla).
The vulnerability has been assigned a CVSS 3 Severity Score of 7.5 (High), indicating its significant impact on system security (Ubuntu Security). The issue specifically involves an assertion failure that can be triggered through specially crafted CGI requests to the Privoxy server.
The primary impact of this vulnerability is on system availability. When successfully exploited, it can lead to a denial of service condition, potentially making the Privoxy service unavailable to legitimate users (CVE Mitre, Gentoo Security).
The vulnerability has been fixed in Privoxy version 3.0.31 and later. Users are advised to upgrade to the latest version of Privoxy. Various Linux distributions have released updated packages to address this vulnerability, including Ubuntu (versions 20.10, 20.04, 18.04, 16.04, and 14.04) and Gentoo (Ubuntu Security Notice, Gentoo Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."