6.8
CVSSv2

CVE-2011-3205

Published: 06/09/2011 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 prior to 3.0.STABLE26, 3.1 prior to 3.1.15, and 3.2 prior to 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression.

Vulnerable Product Search on Vulmon Subscribe to Product

squid-cache squid 3.0.stable13

squid-cache squid 3.0.stable9

squid-cache squid 3.0.stable20

squid-cache squid 3.0.stable14

squid-cache squid 3.0.stable3

squid-cache squid 3.0.stable4

squid-cache squid 3.0.stable24

squid-cache squid 3.0.stable16

squid-cache squid 3.0.stable11

squid-cache squid 3.0.stable18

squid-cache squid 3.0.stable1

squid-cache squid 3.0.stable6

squid-cache squid 3.0.stable15

squid-cache squid 3.0.stable5

squid-cache squid 3.0.stable21

squid-cache squid 3.0.stable17

squid-cache squid 3.0.stable10

squid-cache squid 3.0.stable8

squid-cache squid 3.0.stable12

squid-cache squid 3.0.stable25

squid-cache squid 3.0.stable23

squid-cache squid 3.0.stable22

squid-cache squid 3.0.stable2

squid-cache squid 3.0.stable7

squid-cache squid 3.0.stable19

squid-cache squid 3.1.0.18

squid-cache squid 3.1.13

squid-cache squid 3.1.0.7

squid-cache squid 3.1.0.14

squid-cache squid 3.1.0.12

squid-cache squid 3.1.1

squid-cache squid 3.1.0.3

squid-cache squid 3.1.0.1

squid-cache squid 3.1.14

squid-cache squid 3.1.8

squid-cache squid 3.1.6

squid-cache squid 3.1.0.9

squid-cache squid 3.1.0.15

squid-cache squid 3.1.0.13

squid-cache squid 3.1.12

squid-cache squid 3.1.10

squid-cache squid 3.1.3

squid-cache squid 3.1.0.2

squid-cache squid 3.1.5

squid-cache squid 3.1.7

squid-cache squid 3.1.0.6

squid-cache squid 3.1.0.4

squid-cache squid 3.1

squid-cache squid 3.1.0.16

squid-cache squid 3.1.4

squid-cache squid 3.1.11

squid-cache squid 3.1.0.8

squid-cache squid 3.1.2

squid-cache squid 3.1.0.5

squid-cache squid 3.1.5.1

squid-cache squid 3.1.0.10

squid-cache squid 3.1.9

squid-cache squid 3.1.0.11

squid-cache squid 3.1.0.17

squid-cache squid 3.2.0.9

squid-cache squid 3.2.0.1

squid-cache squid 3.2.0.6

squid-cache squid 3.2.0.10

squid-cache squid 3.2.0.7

squid-cache squid 3.2.0.3

squid-cache squid 3.2.0.4

squid-cache squid 3.2.0.2

squid-cache squid 3.2.0.8

squid-cache squid 3.2.0.5

Vendor Advisories

Debian Bug report logs - #639755 squid3: Buffer overflow in Gopher reply parser Package: squid3; Maintainer for squid3 is Luigi Gangitano <luigi@debianorg>; Source for squid3 is src:squid (PTS, buildd, popcon) Reported by: Luciano Bello <luciano@debianorg> Date: Mon, 29 Aug 2011 22:24:05 UTC Severity: important Ta ...
Ben Hawkes discovered that Squid 3, a full featured Web Proxy cache (HTTP proxy), is vulnerable to a buffer overflow when processing Gopher server replies An attacker can exploit this flaw by connecting to a Gopher server that returns lines longer than 4096 bytes This may result in denial of service conditions (daemon crash) or the possibly the ...

References

NVD-CWE-Otherhttp://openwall.com/lists/oss-security/2011/08/29/2https://bugzilla.redhat.com/show_bug.cgi?id=734583http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patchhttp://www.osvdb.org/74847http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patchhttp://www.securityfocus.com/bid/49356http://www.squid-cache.org/Advisories/SQUID-2011_3.txthttp://secunia.com/advisories/45805http://openwall.com/lists/oss-security/2011/08/30/8http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patchhttp://securitytracker.com/id?1025981http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patchhttp://openwall.com/lists/oss-security/2011/08/30/4http://secunia.com/advisories/46029http://secunia.com/advisories/45920http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.htmlhttp://secunia.com/advisories/45965http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.htmlhttp://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.htmlhttp://www.debian.org/security/2011/dsa-2304http://secunia.com/advisories/45906http://www.redhat.com/support/errata/RHSA-2011-1293.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:150http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.htmlhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=639755https://nvd.nist.govhttps://www.debian.org/security/./dsa-2304