Squid 2.5 up to 2.5.STABLE7 allows remote malicious users to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squid squid 2.5.6 |
||
squid squid 2.5_.stable1 |
||
squid squid 2.5_.stable3 |
||
squid squid 2.5.stable3 |
||
squid squid 2.5.stable4 |
||
squid squid 2.5.stable5 |
||
squid squid 2.5_.stable6 |
||
squid squid 2.5_stable3 |
||
squid squid 2.5.stable6 |
||
squid squid 2.5.stable7 |
||
squid squid 2.5_stable4 |
||
squid squid 2.5_stable9 |
||
squid squid 2.5.stable1 |
||
squid squid 2.5.stable2 |
||
squid squid 2.5_.stable4 |
||
squid squid 2.5_.stable5 |