Page 13 of 65 results (0.004 seconds)

CVSS: 5.0EPSS: 91%CPEs: 27EXPL: 1

Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://secunia.com/advisories/13825 http://security.gentoo.org/glsa/glsa-200501-25.xml http://www.debian.org/security/2005/dsa-651 http://www.mandriva.com/security/advisories?name=MDKSA-2005:014 http://www.novell.com/linux/security/advisories/2005_06_squid.html http://www.redhat.com/support/errata/RHSA-2005-060.html http://www.redhat.com/support/errata/RHSA-2 •

CVSS: 5.0EPSS: 90%CPEs: 27EXPL: 0

The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference. • http://fedoranews.org/updates/FEDORA--.shtml http://secunia.com/advisories/13789 http://security.gentoo.org/glsa/glsa-200501-25.xml http://securitytracker.com/id?1012818 http://www.novell.com/linux/security/advisories/2005_06_squid.html http://www.redhat.com/support/errata/RHSA-2005-060.html http://www.redhat.com/support/errata/RHSA-2005-061.html http://www.securityfocus.com/bid/12220 http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_au •

CVSS: 5.0EPSS: 96%CPEs: 26EXPL: 0

The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 http://fedoranews.org/updates/FEDORA--.shtml http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html http://marc.info/?l=bugtraq&m=109913064629327&w=2 http://secunia.com/advisories/30914 http://secunia.com/advisories/30967 http://www.gentoo.org/security/en/glsa/glsa-200410-15.xml http://www.idefense.com/application& • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 4%CPEs: 1EXPL: 0

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy. Las funciones ntlm_fetch_string y ntlm_get_string en Squid 2.5.6 y anteriores, con autenticación NTLM activada, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete NTLMSSP que hace que se pase un valor negativo a memcpy. • http://fedoranews.org/updates/FEDORA--.shtml http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:093 http://www.securityfocus.com/bid/11098 http://www.squid-cache.org/bugs/show_bug.cgi?id=1045 http://www.trustix.org/errata/2004/0047 http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string https://exchange.xforce.ibmcloud.com/vulnerabilities/17218 https://ov •

CVSS: 7.5EPSS: 2%CPEs: 7EXPL: 3

The "%xx" URL decoding function in Squid 2.5STABLE4 and earlier allows remote attackers to bypass url_regex ACLs via a URL with a NULL ("%00") character, which causes Squid to use only a portion of the requested URL when comparing it against the access control lists. La función de decodificación de URL "%xx" en Squid 2.5STABLE4 y anteriores permite a atacantes remotos saltarse las listas de control de acceso (ACL) url_regex mediante una URL con un carácter nulo ("%00"), lo que hace que Squid use sólo un parte de la URL solicitada para compararla con la lista de control de acceso. • https://www.exploit-db.com/exploits/23777 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000838 http://marc.info/?l=bugtraq&m=108084935904110&w=2 http://security.gentoo.org/glsa/glsa-200403-11.xml http://www.debian.org/security/2004/dsa-474 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:025 http:& •