ID CVE-2004-2654
Summary The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference. NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5.
References
Vulnerable Configurations
  • cpe:2.3:a:squid:squid:2.5_stable5:*:*:*:*:*:*:*
    cpe:2.3:a:squid:squid:2.5_stable5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-09-2008 - 20:44)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
misc
osvdb 9801
sectrack 1011214
secunia
  • 12508
  • 12754
vim 20060223 old Squid clientAbortBody issue - NOT an overflow?
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement Not vulnerable. This issue only affected 2.5 STABLE4 and 2.5 STABLE5 versions of Squid and does not affect the versions of Squid distributed with Red Hat Enterprise Linux.
Last major update 05-09-2008 - 20:44
Published 31-12-2004 - 05:00
Last modified 05-09-2008 - 20:44
Back to Top