Unspecified vulnerability in Squid on SUSE Linux 9.0 allows remote attackers to cause a denial of service (crash) via HTTPs (SSL).
Max CVSS
5.0
EPSS Score
1.60%
Published
2005-10-27
Updated
2008-09-10
The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and earlier allows remote FTP servers to cause a denial of service (segmentation fault) via certain "odd" responses.
Max CVSS
5.0
EPSS Score
20.41%
Published
2005-10-20
Updated
2011-03-08
Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
Max CVSS
5.0
EPSS Score
95.99%
Published
2005-09-30
Updated
2017-10-11
The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests.
Max CVSS
5.0
EPSS Score
15.48%
Published
2005-09-07
Updated
2017-10-11
store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING.
Max CVSS
5.0
EPSS Score
19.19%
Published
2005-09-07
Updated
2017-10-11
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected.
Max CVSS
7.5
EPSS Score
0.22%
Published
2005-05-24
Updated
2008-09-05
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
Max CVSS
6.4
EPSS Score
33.13%
Published
2005-05-11
Updated
2017-10-11
Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator.
Max CVSS
7.5
EPSS Score
1.06%
Published
2005-05-02
Updated
2017-10-11
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
Max CVSS
5.0
EPSS Score
7.37%
Published
2005-04-14
Updated
2018-10-03
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.
Max CVSS
2.6
EPSS Score
0.59%
Published
2005-03-08
Updated
2018-10-03
Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.
Max CVSS
5.0
EPSS Score
95.78%
Published
2005-05-02
Updated
2017-10-11
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
Max CVSS
5.0
EPSS Score
96.55%
Published
2005-05-02
Updated
2017-10-11
Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings.
Max CVSS
10.0
EPSS Score
0.92%
Published
2005-05-02
Updated
2016-10-18
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.
Max CVSS
5.0
EPSS Score
4.69%
Published
2005-02-07
Updated
2017-10-11
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Max CVSS
5.0
EPSS Score
97.00%
Published
2005-02-07
Updated
2017-10-11
squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server.
Max CVSS
7.5
EPSS Score
1.09%
Published
2005-05-02
Updated
2017-10-11
The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.
Max CVSS
5.0
EPSS Score
90.57%
Published
2005-01-11
Updated
2017-10-11
Memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (memory consumption).
Max CVSS
5.0
EPSS Score
6.19%
Published
2005-01-25
Updated
2017-10-11
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
Max CVSS
5.0
EPSS Score
96.98%
Published
2005-01-15
Updated
2017-10-11
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
Max CVSS
5.0
EPSS Score
92.93%
Published
2005-01-15
Updated
2017-10-11
The asn_parse_header function (asn1.c) in the SNMP module for Squid Web Proxy Cache before 2.4.STABLE7 allows remote attackers to cause a denial of service (server restart) via certain SNMP packets with negative length fields that trigger a memory allocation error.
Max CVSS
5.0
EPSS Score
96.35%
Published
2005-01-27
Updated
2017-10-11
21 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!