<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tinyproxy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/tinyproxy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 30 Mar 2026 08:16:17 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/tinyproxy/feed.xml" rel="self" type="application/rss+xml"/><item><title>Tinyproxy HTTP Chunked Encoding Integer Overflow Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-03-tinyproxy-dos/</link><pubDate>Mon, 30 Mar 2026 08:16:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-tinyproxy-dos/</guid><description>An integer overflow vulnerability in Tinyproxy's HTTP chunked transfer encoding parser (versions &lt;= 1.11.3) allows an unauthenticated remote attacker to cause a denial of service by sending a crafted chunk size that bypasses validation, leading to resource exhaustion.</description><content:encoded><![CDATA[<p>Tinyproxy, a lightweight HTTP/HTTPS proxy daemon, is vulnerable to an integer overflow in its chunked transfer encoding parser. This vulnerability, identified as CVE-2026-3945, affects versions up to and including 1.11.3. A remote, unauthenticated attacker can exploit this flaw by sending a specially crafted HTTP request containing an invalid chunk size value, such as 0x7fffffffffffffff. The <code>strtol()</code> function is used to parse chunk sizes but fails to properly validate overflow conditions, specifically the <code>ERANGE</code> error. This bypasses a check designed to prevent negative chunk lengths (<code>chunklen &lt; 0</code>). The subsequent signed integer overflow during arithmetic operations leads to the proxy attempting to read an excessively large amount of data, exhausting resources and preventing new connections, effectively causing a denial-of-service condition. Although the upstream has addressed the issue in commit bb7edc4, the latest stable release (1.11.3) remains vulnerable.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends an HTTP request to the Tinyproxy server.</li>
<li>The HTTP request uses chunked transfer encoding.</li>
<li>The attacker includes a crafted chunk size value, such as 0x7fffffffffffffff (LONG_MAX), within the request headers.</li>
<li>The Tinyproxy server parses the chunk size using <code>strtol()</code>.</li>
<li>The <code>strtol()</code> function does not adequately validate the integer overflow (errno == ERANGE).</li>
<li>The crafted chunk size bypasses the initial validation check (<code>chunklen &lt; 0</code>).</li>
<li>A signed integer overflow occurs during arithmetic operations (<code>chunklen + 2</code>).</li>
<li>The proxy attempts to read an extremely large amount of request-body data, exhausting available worker slots and preventing new connections, causing a denial of service (DoS).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-3945 leads to a denial-of-service condition. The vulnerable Tinyproxy instance becomes unresponsive as it exhausts its available worker slots. This prevents legitimate users from accessing services proxied by the affected server. The impact is significant as it can completely disrupt services reliant on the proxy, affecting all users until the service is manually restarted or patched. The severity is high due to the ease of exploitation (unauthenticated remote attacker) and the potential for widespread service disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Tinyproxy to a version patched against CVE-2026-3945 (commit bb7edc4 or later). If an upgrade is not immediately feasible, consider implementing a web application firewall (WAF) rule to filter requests with excessively large chunk sizes to mitigate the vulnerability.</li>
<li>Deploy the Sigma rule <code>Detect Suspiciously Large HTTP Chunk Size</code> to identify requests with abnormally large chunk sizes within HTTP traffic, indicating potential exploitation attempts of CVE-2026-3945.</li>
<li>Monitor web server logs for HTTP requests with chunk sizes exceeding a reasonable threshold. Analyze the request patterns to identify potential malicious actors attempting to exploit this vulnerability using the <code>webserver</code> log source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>tinyproxy</category><category>denial-of-service</category><category>integer-overflow</category><category>cve-2026-3945</category></item></channel></rss>