Vulnerabilities > Squid
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-09-07 | CVE-2005-2794 | Remote Denial Of Service vulnerability in Squid Proxy Aborted Requests store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING. | 5.0 |
2005-05-24 | CVE-2005-1711 | Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected. | 7.5 |
2005-05-11 | CVE-2005-1519 | DNS Spoofing vulnerability in Squid Proxy Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups. | 6.4 |
2005-05-02 | CVE-2005-1345 | Remote Security vulnerability in Squid Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator. | 7.5 |
2005-05-02 | CVE-2005-0446 | Remote Denial Of Service vulnerability in Squid Proxy DNS Name Resolver Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure. | 5.0 |
2005-05-02 | CVE-2005-0241 | Remote vulnerability in Squid Proxy Oversize HTTP Headers The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size. | 5.0 |
2005-05-02 | CVE-2005-0194 | Security Bypass vulnerability in Squid Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings. | 10.0 |
2005-05-02 | CVE-2005-0173 | Authentication Bypass vulnerability in Squid Proxy squid_ldap_auth squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server. | 7.5 |
2005-04-14 | CVE-2005-0718 | Remote Denial Of Service vulnerability in Squid Proxy Aborted Connection Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory. | 5.0 |
2005-03-08 | CVE-2005-0626 | Information Disclosure vulnerability in Squid 2.5.Stable5/2.5.Stable6/2.5.Stable7 Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies. | 2.6 |