5
CVSSv2

CVE-2007-6239

Published: 04/12/2007 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The "cache update reply processing" functionality in Squid 2.x prior to 2.6.STABLE17 and Squid 3.0 allows remote malicious users to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.

Vulnerable Product Search on Vulmon Subscribe to Product

squid squid web proxy cache 2.0_patch2

squid squid web proxy cache 2.1_patch2

squid squid web proxy cache 2.5.stable11

squid squid web proxy cache 2.5.stable12

squid squid web proxy cache 2.5_stable4

squid squid web proxy cache 2.5_stable5

squid squid web proxy cache 2.6.stable14

squid squid web proxy cache 2.6.stable15

squid squid web proxy cache 2.6.stable7

squid squid web proxy cache 3.0

squid squid web proxy cache 2.4_stable2

squid squid web proxy cache 2.4_stable4

squid squid web proxy cache 2.5_.stable9

squid squid web proxy cache 2.5_stable1

squid squid web proxy cache 2.5_stable8

squid squid web proxy cache 2.6

squid squid web proxy cache 2.6.stable1

squid squid web proxy cache 2.6.stable3

squid squid web proxy cache 2.6.stable4

squid squid web proxy cache 3.0_pre3

squid squid web proxy cache 2.3.stable4

squid squid web proxy cache 2.3.stable5

squid squid web proxy cache 2.5.stable13

squid squid web proxy cache 2.5.stable14

squid squid web proxy cache 2.5_stable6

squid squid web proxy cache 2.5_stable7

squid squid web proxy cache 2.6.stable16

squid squid web proxy cache 2.6.stable2

squid squid web proxy cache 3.0_pre1

squid squid web proxy cache 3.0_pre2

squid squid web proxy cache 2.4_stable6

squid squid web proxy cache 2.4_stable7

squid squid web proxy cache 2.5_stable10

squid squid web proxy cache 2.5_stable3

squid squid web proxy cache 2.6.stable12

squid squid web proxy cache 2.6.stable13

squid squid web proxy cache 2.6.stable5

squid squid web proxy cache 2.6.stable6

Vendor Advisories

Debian Bug report logs - #455910 CVE-2007-6239: Denial of service via HTTP headers Package: squid; Maintainer for squid is Luigi Gangitano <luigi@debianorg>; Source for squid is src:squid (PTS, buildd, popcon) Reported by: Micah Anderson <micah@debianorg> Date: Wed, 12 Dec 2007 14:33:04 UTC Severity: important Tag ...
It was discovered that Squid did not always clean up cache memory correctly A remote attacker could manipulate cache update replies and cause Squid to use all available memory, leading to a denial of service ...
It was discovered that Squid did not perform proper bounds checking when processing cache update replies A remote authenticated user may be able to trigger an assertion error and cause a denial of service This vulnerability is due to an incorrect upstream fix for CVE-2007-6239 (CVE-2008-1612) ...
A weakness has been discovered in squid, a caching proxy server The flaw was introduced upstream in response to CVE-2007-6239, and announced by Debian in DSA-1482-1 The flaw involves an over-aggressive bounds check on an array resize, and could be exploited by an authorized client to induce a denial of service condition against squid For the sta ...
It was discovered that malformed cache update replies against the Squid WWW proxy cache could lead to the exhaustion of system memory, resulting in potential denial of service For the old stable distribution (sarge), the update cannot currently be processed on the buildd security network due to a bug in the archive management script This will be ...