Page 11 of 60 results (0.004 seconds)

CVSS: 7.5EPSS: 1%CPEs: 38EXPL: 0

squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://marc.info/?l=bugtraq&m=110780531820947&w=2 http://www.debian.org/security/2005/dsa-667 http://www.kb.cert.org/vuls/id/924198 http://www.mandriva.com/security/advisories?name=MDKSA-2005:034 http://www.novell.com/linux/security/advisories/2005_06_squid.html http://www.redhat.com/support/errata/RHSA-2005-060.html http://www.redhat.com/support/errat •

CVSS: 5.0EPSS: 95%CPEs: 26EXPL: 0

The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://marc.info/?l=bugtraq&m=109913064629327&w=2 http://secunia.com/advisories/30914 http://secunia.com/advisories/30967 http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml http://www.idefense.com/application& • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 0

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy. Las funciones ntlm_fetch_string y ntlm_get_string en Squid 2.5.6 y anteriores, con autenticación NTLM activada, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete NTLMSSP que hace que se pase un valor negativo a memcpy. • http://fedoranews.org/updates/FEDORA--.shtml http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:093 http://www.securityfocus.com/bid/11098 http://www.squid-cache.org/bugs/show_bug.cgi?id=1045 http://www.trustix.org/errata/2004/0047 http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string https://exchange.xforce.ibmcloud.com/vulnerabilities/17218 https://ov •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000506 http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9479.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.osvdb.org/5924 http://www.securityfocus.com/bid/5158 •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9480.php http://www.iss.net/security_center/static/9481.php http://www.iss.net/security_center/static/9482.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com&# •