Squid 2.5 up to 2.5.STABLE7 allows remote malicious users to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squid squid 2.5 stable9 |
||
squid squid 2.5 .stable3 |
||
squid squid 2.5.stable5 |
||
squid squid 2.5 stable3 |
||
squid squid 2.5.stable3 |
||
squid squid 2.5.6 |
||
squid squid 2.5.stable1 |
||
squid squid 2.5 .stable5 |
||
squid squid 2.5.stable6 |
||
squid squid 2.5 .stable6 |
||
squid squid 2.5.stable4 |
||
squid squid 2.5.stable2 |
||
squid squid 2.5 .stable1 |
||
squid squid 2.5 .stable4 |
||
squid squid 2.5 stable4 |
||
squid squid 2.5.stable7 |