[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-6239Date: (C)2007-12-04   (M)2023-12-22


The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
SECTRACK-1019036
BID-26687
SECUNIA-27910
SECUNIA-28091
SECUNIA-28109
SECUNIA-28350
SECUNIA-28381
SECUNIA-28403
SECUNIA-28412
SECUNIA-28814
SECUNIA-34467
ADV-2007-4066
DSA-1482
FEDORA-2007-4161
FEDORA-2007-4170
GLSA-200801-05
GLSA-200903-38
MDVSA-2008:002
RHSA-2007:1130
SUSE-SR:2008:001
USN-565-1
VU#232881
http://bugs.gentoo.org/show_bug.cgi?id=201209
http://www.squid-cache.org/Advisories/SQUID-2007_2.txt
http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch
https://bugzilla.redhat.com/show_bug.cgi?id=410181
oval:org.mitre.oval:def:10915

CWE    1
CWE-20
OVAL    3
oval:org.mitre.oval:def:7991
oval:org.mitre.oval:def:7232
oval:org.secpod.oval:def:301297

© SecPod Technologies