ID CVE-2004-0541
Summary Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
References
Vulnerable Configurations
  • cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.5_stable:*:*:*:*:*:*:*
    cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:2.5_stable:*:*:*:*:*:*:*
  • cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:3_pre:*:*:*:*:*:*:*
    cpe:2.3:a:national_science_foundation:squid_web_proxy_cache:3_pre:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 03-05-2018 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
oval via4
  • accepted 2013-04-29T04:08:06.097-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
    family unix
    id oval:org.mitre.oval:def:10722
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
    version 29
  • accepted 2010-09-20T04:00:47.787-04:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Jonathan Baker
      organization The MITRE Corporation
    description Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).
    family unix
    id oval:org.mitre.oval:def:980
    status accepted
    submitted 2004-06-10T12:00:00.000-04:00
    title NTLM Authentication BO in Squid Web Proxy Cache
    version 6
redhat via4
advisories
rhsa
id RHSA-2004:242
rpms
  • squid-7:2.5.STABLE3-6.3E
  • squid-debuginfo-7:2.5.STABLE3-6.3E
refmap via4
bid 10500
fedora FLSA-2006:152809
gentoo GLSA-200406-13
mandrake MDKSA-2004:059
misc http://www.idefense.com/application/poi/display?id=107&type=vulnerabilities
sgi 20040604-01-U
suse SuSE-SA:2004:016
trustix 2004-0033
xf squid-ntlm-bo(16360)
Last major update 03-05-2018 - 01:29
Published 06-08-2004 - 04:00
Last modified 03-05-2018 - 01:29
Back to Top