CVE-2004-0832
https://notcve.org/view.php?id=CVE-2004-0832
The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy. Las funciones ntlm_fetch_string y ntlm_get_string en Squid 2.5.6 y anteriores, con autenticación NTLM activada, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete NTLMSSP que hace que se pase un valor negativo a memcpy. • http://fedoranews.org/updates/FEDORA--.shtml http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:093 http://www.securityfocus.com/bid/11098 http://www.squid-cache.org/bugs/show_bug.cgi?id=1045 http://www.trustix.org/errata/2004/0047 http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string https://exchange.xforce.ibmcloud.com/vulnerabilities/17218 https://ov •
CVE-2002-0714
https://notcve.org/view.php?id=CVE-2002-0714
FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000506 http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9479.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.osvdb.org/5924 http://www.securityfocus.com/bid/5158 •
CVE-2002-0713
https://notcve.org/view.php?id=CVE-2002-0713
Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9480.php http://www.iss.net/security_center/static/9481.php http://www.iss.net/security_center/static/9482.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com •
CVE-2002-0715
https://notcve.org/view.php?id=CVE-2002-0715
Vulnerability in Squid before 2.4.STABLE6 related to proxy authentication credentials may allow remote web sites to obtain the user's proxy login and password. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt http://marc.info/?l=bugtraq&m=102674543407606&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://rhn.redhat.com/errata/RHSA-2002-130.html http://www.iss.net/security_center/static/9478.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php http://www.securityfocus.com/bid/5154 http://www.squid-cache.org/Advisories/SQUID-2002_3.txt http://www.squid-cache.org/Versions/ •
CVE-2002-0163 – Squid 2.4.1 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2002-0163
Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses. Desbordamiento de buffer en Squid anterior a 2.4.9 permite a un atacante remoto producir una denegación de servicio, y probablemente ejecutar código arbitrario, mediante respuestas DNS comprimidas. • https://www.exploit-db.com/exploits/347 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-017.1.txt ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:19.squid.asc http://marc.info/?l=bugtraq&m=101716495023226&w=2 http://rhn.redhat.com/errata/RHSA-2002-051.html http://www.iss.net/security_center/static/8628.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-027.php http://www.securityfocus.com/bid/4363 http://www.squid-cache •