6.4
CVSSv2

CVE-2005-1519

Published: 11/05/2005 Updated: 11/10/2017
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Squid 2.5 STABLE9 and previous versions, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote malicious users to spoof DNS lookups.

Vulnerable Product Search on Vulmon Subscribe to Product

squid squid

Vendor Advisories

It was discovered that Squid did not verify the validity of DNS server responses When Squid is started, it opens a DNS client UDP port whose number is randomly assigned by the operating system Unless your network firewall is configured to accept DNS responses only from known good nameservers, this vulnerability allowed users within the local netw ...
Synopsis squid security update Type/Severity Security Advisory: Low Topic An updated squid package that fixes several security issues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Squid is a full-featured Web prox ...
Synopsis squid security update Type/Severity Security Advisory: Low Topic An updated squid package that fixes several security issues is now availableThis update has been rated as having low security impact by the Red HatSecurity Response Team Description Squid is a full-featured Web prox ...
The upstream developers have discovered a bug in the DNS lookup code of Squid, the popular WWW proxy cache When the DNS client UDP port (assigned by the operating system at startup) is unfiltered and the network is not protected from IP spoofing, malicious users can spoof DNS lookups which could result in users being redirected to arbitrary web si ...