CVE-2004-0918
Squid SNMP DoS
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Remote exploitation of a design error in the SNMP module of Squid Web Proxy Cache may lead to a denial of service. The problem specifically exists due to an ASN1 parsing error where certain header length combinations can slip through the validations performed by the ASN1 parser, eventually causing the server to restart and close all current connections. The server takes several seconds to restart.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-09-27 CVE Reserved
- 2004-10-13 CVE Published
- 2024-08-08 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities&flashstatus=false | Third Party Advisory | |
http://www.squid-cache.org/Advisories/SQUID-2004_3.txt | X_refsource_confirm | |
http://www.squid-cache.org/Advisories/SQUID-2008_1.txt | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17688 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10931 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2004-591.html | 2017-10-11 | |
http://www.securityfocus.com/bid/11385 | 2017-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Openpkg Search vendor "Openpkg" | Openpkg Search vendor "Openpkg" for product "Openpkg" | 2.1 Search vendor "Openpkg" for product "Openpkg" and version "2.1" | - |
Affected
| ||||||
Openpkg Search vendor "Openpkg" | Openpkg Search vendor "Openpkg" for product "Openpkg" | 2.2 Search vendor "Openpkg" for product "Openpkg" and version "2.2" | - |
Affected
| ||||||
Openpkg Search vendor "Openpkg" | Openpkg Search vendor "Openpkg" for product "Openpkg" | current Search vendor "Openpkg" for product "Openpkg" and version "current" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.0_patch2 Search vendor "Squid" for product "Squid" and version "2.0_patch2" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.1_patch2 Search vendor "Squid" for product "Squid" and version "2.1_patch2" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.3_.stable4 Search vendor "Squid" for product "Squid" and version "2.3_.stable4" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.3_.stable5 Search vendor "Squid" for product "Squid" and version "2.3_.stable5" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.4 Search vendor "Squid" for product "Squid" and version "2.4" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.4_.stable2 Search vendor "Squid" for product "Squid" and version "2.4_.stable2" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.4_.stable6 Search vendor "Squid" for product "Squid" and version "2.4_.stable6" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.4_.stable7 Search vendor "Squid" for product "Squid" and version "2.4_.stable7" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.5_.stable1 Search vendor "Squid" for product "Squid" and version "2.5_.stable1" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.5_.stable3 Search vendor "Squid" for product "Squid" and version "2.5_.stable3" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.5_.stable4 Search vendor "Squid" for product "Squid" and version "2.5_.stable4" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.5_.stable5 Search vendor "Squid" for product "Squid" and version "2.5_.stable5" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 2.5_.stable6 Search vendor "Squid" for product "Squid" and version "2.5_.stable6" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 3.0_pre1 Search vendor "Squid" for product "Squid" and version "3.0_pre1" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 3.0_pre2 Search vendor "Squid" for product "Squid" and version "3.0_pre2" | - |
Affected
| ||||||
Squid Search vendor "Squid" | Squid Search vendor "Squid" for product "Squid" | 3.0_pre3 Search vendor "Squid" for product "Squid" and version "3.0_pre3" | - |
Affected
| ||||||
Gentoo Search vendor "Gentoo" | Linux Search vendor "Gentoo" for product "Linux" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Fedora Core Search vendor "Redhat" for product "Fedora Core" | core_2.0 Search vendor "Redhat" for product "Fedora Core" and version "core_2.0" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 1.5 Search vendor "Trustix" for product "Secure Linux" and version "1.5" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.0 Search vendor "Trustix" for product "Secure Linux" and version "2.0" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.1 Search vendor "Trustix" for product "Secure Linux" and version "2.1" | - |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Ubuntu Linux Search vendor "Ubuntu" for product "Ubuntu Linux" | 4.1 Search vendor "Ubuntu" for product "Ubuntu Linux" and version "4.1" | ia64 |
Affected
| ||||||
Ubuntu Search vendor "Ubuntu" | Ubuntu Linux Search vendor "Ubuntu" for product "Ubuntu Linux" | 4.1 Search vendor "Ubuntu" for product "Ubuntu Linux" and version "4.1" | ppc |
Affected
|