Tinyproxy 1.8.3 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via (1) a large number of headers or (2) a large number of forged headers that trigger hash collisions predictably. bucket.
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/1036985
https://banu.com/bugzilla/show_bug.cgi?id=110#c2
https://banu.com/bugzilla/show_bug.cgi?id=110
http://www.securitytracker.com/id?1027412
http://www.openwall.com/lists/oss-security/2012/08/18/1
http://www.openwall.com/lists/oss-security/2012/08/17/3
http://www.debian.org/security/2012/dsa-2564
http://secunia.com/advisories/51074