Page 11 of 119 results (0.023 seconds)

CVSS: 5.3EPSS: 86%CPEs: 16EXPL: 0

06 Feb 2005 — Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931 •

CVSS: 7.5EPSS: 81%CPEs: 16EXPL: 0

06 Feb 2005 — Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931 •

CVSS: 10.0EPSS: 1%CPEs: 38EXPL: 0

06 Feb 2005 — Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 2%CPEs: 27EXPL: 0

19 Jan 2005 — Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 46%CPEs: 27EXPL: 1

15 Jan 2005 — Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 75%CPEs: 27EXPL: 1

15 Jan 2005 — The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 48%CPEs: 27EXPL: 0

11 Jan 2005 — The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference. • http://fedoranews.org/updates/FEDORA--.shtml •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference. NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5. • http://secunia.com/advisories/12508 •

CVSS: 7.5EPSS: 68%CPEs: 26EXPL: 0

21 Oct 2004 — The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 14%CPEs: 1EXPL: 0

28 Sep 2004 — The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy. Las funciones ntlm_fetch_string y ntlm_get_string en Squid 2.5.6 y anteriores, con autenticación NTLM activada, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete NTLMSSP que hace que se pas... • http://fedoranews.org/updates/FEDORA--.shtml •