CVE-2009-2855
squid: DoS (100% CPU use) while processing certain external ACL helper HTTP headers
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
La función strListGetItem en src/HttpHeaderTools.c en Squid v2.7 a permite a los atacantes remotos causar una denegación de servicio a través de una cabecera auth manipulada con ciertos delimitadores coma que lanzan un bucle infinito de llamadas a la función strcspn.
It was discovered that Squid incorrectly handled certain auth headers. A remote attacker could exploit this with a specially-crafted auth header and cause Squid to go into an infinite loop, resulting in a denial of service. This issue only affected Ubuntu 8.10, 9.04 and 9.10. It was discovered that Squid incorrectly handled certain DNS packets. A remote attacker could exploit this with a specially-crafted DNS packet and cause Squid to crash, resulting in a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-08-18 CVE Reserved
- 2009-08-18 CVE Published
- 2024-08-07 CVE Updated
- 2025-05-06 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (13)
| URL | Tag | Source |
|---|---|---|
| http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534982 | X_refsource_confirm | |
| http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31%3Bfilename=diff%3Batt=1%3Bbug=534982 | X_refsource_misc | |
| http://www.openwall.com/lists/oss-security/2009/07/20/10 | Mailing List |
|
| http://www.openwall.com/lists/oss-security/2009/08/03/3 | Mailing List |
|
| http://www.openwall.com/lists/oss-security/2009/08/04/6 | Mailing List |
|
| http://www.securityfocus.com/bid/36091 | Vdb Entry | |
| http://www.securitytracker.com/id?1022757 | Vdb Entry | |
| http://www.squid-cache.org/bugs/show_bug.cgi?id=2541 | X_refsource_confirm | |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/52610 | Vdb Entry | |
| https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10592 | Signature |
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|
| URL | Date | SRC |
|---|---|---|
| http://www.squid-cache.org/bugs/show_bug.cgi?id=2704 | 2023-11-07 | |
| https://bugzilla.redhat.com/show_bug.cgi?id=518182 | 2010-03-29 | |
| https://access.redhat.com/security/cve/CVE-2009-2855 | 2010-03-29 |
Affected Vendors, Products, and Versions
| Vendor | Product | Version | Other | Status | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
| Squid-cache Search vendor "Squid-cache" | Squid Search vendor "Squid-cache" for product "Squid" | 2.7 Search vendor "Squid-cache" for product "Squid" and version "2.7" | - |
Affected
| ||||||
| Squid-cache Search vendor "Squid-cache" | Squid Search vendor "Squid-cache" for product "Squid" | 2.7 Search vendor "Squid-cache" for product "Squid" and version "2.7" | stable3 |
Affected
| ||||||
| Squid-cache Search vendor "Squid-cache" | Squid Search vendor "Squid-cache" for product "Squid" | 2.7 Search vendor "Squid-cache" for product "Squid" and version "2.7" | stable4 |
Affected
| ||||||
