Vulnerability Details : CVE-2009-3826
Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2009-3826
Probability of exploitation activity in the next 30 days: 2.95%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-3826
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-3826
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3826
- http://www.vupen.com/english/advisories/2010/1043
- http://www.debian.org/security/2010/dsa-2040
- http://www.securityfocus.com/bid/36800
-
http://www.vupen.com/english/advisories/2009/3013
Patch;Vendor Advisory
- http://securitytracker.com/id?1023079
- http://www.securityfocus.com/archive/1/507440/100/0/threaded
-
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:014
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/53922
-
http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019
Vendor Advisory
Products affected by CVE-2009-3826
- cpe:2.3:a:squidguard:squidguard:1.4:*:*:*:*:*:*:*