CVE-2005-0241

Scores

EPSS

0.862high86.2%
0%20%40%60%80%100%

Percentile: 86.2%

CVSS

5.0medium2.0
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Description

The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling “oversized” HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhat

Vulnerable Software (4)

Type: Configuration

Product: squid

Operating System: rhel 3

Trait:
{  "fixed": "2.5.STABLE3-6.3E.7"}

Source: redhat

Type: Configuration

Product: squid

Operating System: rhel 4

Trait:
{  "fixed": "2.5.STABLE6-3.4E.3"}

Source: redhat

Type: Configuration

Product: squid

Operating System: debian

Trait:
{  "fixed": "2.5.7-7"}

Source: debian

Type: Configuration

Vendor: *

Product: squid

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*",...

Source: nvd

End of list