[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-6239Date: (C)2007-12-04   (M)2018-06-02


The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 5.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: NONE
Scope: Integrity: NONE
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
SECTRACK-1019036
BID-26687
SECUNIA-27910
SECUNIA-28091
SECUNIA-28109
SECUNIA-28350
SECUNIA-28381
SECUNIA-28403
SECUNIA-28412
SECUNIA-28814
SECUNIA-34467
ADV-2007-4066
DSA-1482
FEDORA-2007-4161
FEDORA-2007-4170
GLSA-200801-05
GLSA-200903-38
MDVSA-2008:002
RHSA-2007:1130
SUSE-SR:2008:001
USN-565-1
VU#232881
http://bugs.gentoo.org/show_bug.cgi?id=201209
http://www.squid-cache.org/Advisories/SQUID-2007_2.txt
http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch
https://bugzilla.redhat.com/show_bug.cgi?id=410181

CWE    1
CWE-20
OVAL    3
oval:org.mitre.oval:def:7991
oval:org.mitre.oval:def:7232
oval:org.secpod.oval:def:301297

© SecPod Technologies