10
CVSSv2

CVE-2005-0194

Published: 02/05/2005 Updated: 18/10/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote malicious users to bypass intended ACLs if the administrator ignores the parser warnings.

Vulnerable Product Search on Vulmon Subscribe to Product

squid squid 2.0.release

squid squid 2.1.patch1

squid squid 2.2.pre1

squid squid 2.2.pre2

squid squid 2.3.devel3

squid squid 2.3.stable1

squid squid 2.4.stable3

squid squid 2.4.stable4

squid squid 2.5.stable6

squid squid 2.0.patch2

squid squid 2.0.pre1

squid squid 2.1.release

squid squid 2.2.devel3

squid squid 2.2.devel4

squid squid 2.2.stable5

squid squid 2.3.devel2

squid squid 2.4.stable1

squid squid 2.4.stable2

squid squid 2.5.stable4

squid squid 2.5.stable5

squid squid 2.1.patch2

squid squid 2.1.pre1

squid squid 2.2.stable1

squid squid 2.2.stable2

squid squid 2.3.stable2

squid squid 2.3.stable3

squid squid 2.4.stable6

squid squid 2.4.stable7

squid squid 2.0.patch1

squid squid 2.1.pre3

squid squid 2.1.pre4

squid squid 2.2.stable3

squid squid 2.2.stable4

squid squid 2.3.stable4

squid squid 2.3.stable5

squid squid 2.5.stable1

squid squid 2.5.stable2

squid squid 2.5.stable3

Vendor Advisories

When parsing the configuration file, squid interpreted empty Access Control Lists (ACLs) without defined authentication schemes in a non-obvious way This could allow remote attackers to bypass intended ACLs (CAN-2005-0194) ...