Vulnerability Details : CVE-2004-0832
The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2004-0832
Probability of exploitation activity in the next 30 days: 3.57%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0832
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2004-0832
-
http://www.mandriva.com/security/advisories?name=MDKSA-2004:093
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10489
-
http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string
-
http://www.trustix.org/errata/2004/0047/
Trustix | Empowering Trust and Security in the Digital AgePatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17218
-
http://www.securityfocus.com/bid/11098
Patch;Vendor Advisory
- http://fedoranews.org/updates/FEDORA--.shtml
-
http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml
Patch;Vendor Advisory
-
http://www.squid-cache.org/bugs/show_bug.cgi?id=1045
Products affected by CVE-2004-0832
- cpe:2.3:a:squid:squid:*:*:*:*:*:*:*:*