5
CVSSv2

CVE-2005-0241

Published: 02/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and previous versions does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote malicious users to poison the cache or bypass access controls based on header size.

Vulnerable Product Search on Vulmon Subscribe to Product

squid squid 2.5.stable3

squid squid 2.5.stable4

squid squid 2.5.stable1

squid squid 2.5.stable2

squid squid 2.5.stable5

squid squid 2.5.stable6

squid squid 2.5.stable7

Vendor Advisories

Synopsis squid security update Type/Severity Security Advisory: Important Topic An updated Squid package that fixes several security issues is now availableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description Squid is a full-featu ...
Synopsis squid security update Type/Severity Security Advisory: Important Topic An updated Squid package that fixes several security issues is now available Description Squid is a full-featured Web proxy cacheA buffer overflow flaw was found in the Gopher relay parser This bugcould allow ...