
Cloud Vulnerability DB
A community-led vulnerabilities database
Polipo through version 1.1.1, when NDEBUG is used, contains a heap-based buffer overflow vulnerability during the parsing of Range headers. This vulnerability was discovered and disclosed in July 2021. It's important to note that this vulnerability only affects products that are no longer supported by the maintainer (NVD).
The vulnerability is classified as an Out-of-bounds Write (CWE-787) with a CVSS v3.1 Base Score of 7.5 (HIGH). The vulnerability is characterized by a heap buffer overflow that occurs during the parsing of Range headers when NDEBUG is defined. The technical analysis revealed a WRITE operation of size 10 at a memory location that was 0 bytes to the right of a 7-byte allocated region, leading to buffer overflow conditions (OpenWall, NVD).
The vulnerability can lead to heap buffer overflow conditions, which typically result in program crashes and potential remote code execution. The CVSS scoring indicates high severity impact particularly on the availability aspect of the system, with no direct impact on confidentiality or integrity (NVD).
Since this vulnerability affects products that are no longer maintained, there are no official patches available. The recommended mitigation would be to discontinue the use of Polipo and migrate to a supported alternative web proxy solution (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."