CVE-2021-20213
📋 TL;DR
This vulnerability in Privoxy allows a denial-of-service attack when specific conditions are met. If accept-intercepted-requests is enabled and Privoxy fails to parse the Host header while memory allocation fails, it dereferences a NULL pointer causing a crash. This affects Privoxy users with accept-intercepted-requests enabled in versions before 3.0.29.
💻 Affected Systems
- Privoxy
📦 What is this software?
Privoxy by Privoxy
⚠️ Risk & Real-World Impact
Worst Case
Complete service disruption of Privoxy proxy, causing loss of proxy functionality for all users
Likely Case
Intermittent crashes of Privoxy service requiring manual restart
If Mitigated
No impact if accept-intercepted-requests is disabled or proper version is used
🎯 Exploit Status
Requires specific configuration (accept-intercepted-requests enabled) and conditions (failed Host header parsing with memory allocation failure)
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.29 and later
Vendor Advisory: https://www.privoxy.org/3.0.29/user-manual/whatsnew.html
Restart Required: Yes
Instructions:
1. Download Privoxy 3.0.29 or later from privoxy.org 2. Stop Privoxy service 3. Install new version 4. Restart Privoxy service
🔧 Temporary Workarounds
Disable accept-intercepted-requests
allDisable the vulnerable configuration option to prevent exploitation
Edit privoxy config file and set: accept-intercepted-requests 0
Restart privoxy: systemctl restart privoxy
🧯 If You Can't Patch
- Disable accept-intercepted-requests in configuration
- Implement network segmentation to limit access to Privoxy instances
🔍 How to Verify
Check if Vulnerable:
Check Privoxy version and configuration: privoxy --version and verify accept-intercepted-requests setting
Check Version:
privoxy --version
Verify Fix Applied:
Verify version is 3.0.29 or later: privoxy --version
📡 Detection & Monitoring
Log Indicators:
- Privoxy crash logs
- Segmentation fault errors in system logs
- Unexpected service restarts
Network Indicators:
- Sudden loss of proxy connectivity
- HTTP requests failing to proxy
SIEM Query:
source="privoxy.log" AND ("segmentation fault" OR "crash" OR "NULL pointer")
🔗 References
- https://bugzilla.redhat.com/show_bug.cgi?id=1928739
- https://security.gentoo.org/glsa/202107-16
- https://www.privoxy.org/3.0.29/user-manual/whatsnew.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1928739
- https://security.gentoo.org/glsa/202107-16
- https://www.privoxy.org/3.0.29/user-manual/whatsnew.html