Page 6 of 64 results (0.014 seconds)

CVSS: 7.5EPSS: 11%CPEs: 58EXPL: 0

12 Mar 2005 — Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931 •

CVSS: 9.1EPSS: 0%CPEs: 3EXPL: 0

03 Mar 2005 — Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies. • http://fedoranews.org/updates/FEDORA--.shtml •

CVSS: 7.5EPSS: 94%CPEs: 59EXPL: 0

15 Feb 2005 — Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931 •

CVSS: 9.1EPSS: 95%CPEs: 7EXPL: 0

08 Feb 2005 — The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931 •

CVSS: 9.8EPSS: 41%CPEs: 7EXPL: 0

06 Feb 2005 — Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter. • http://fedoranews.org/updates/FEDORA--.shtml • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.1EPSS: 2%CPEs: 38EXPL: 0

06 Feb 2005 — squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 10.0EPSS: 4%CPEs: 38EXPL: 0

06 Feb 2005 — Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 54%CPEs: 27EXPL: 0

19 Jan 2005 — Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption). • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 96%CPEs: 27EXPL: 1

15 Jan 2005 — The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •

CVSS: 7.5EPSS: 88%CPEs: 27EXPL: 1

15 Jan 2005 — Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 •