The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.
References
Configurations
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://fedoranews.org/updates/FEDORA--.shtml - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200409-04.xml - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:093 - | |
References | () http://www.securityfocus.com/bid/11098 - Patch, Vendor Advisory | |
References | () http://www.squid-cache.org/bugs/show_bug.cgi?id=1045 - | |
References | () http://www.trustix.org/errata/2004/0047/ - Patch, Vendor Advisory | |
References | () http://www1.uk.squid-cache.org/squid/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-ntlm_fetch_string - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17218 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10489 - |
Information
Published : 2004-11-03 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0832
Mitre link : CVE-2004-0832
CVE.ORG link : CVE-2004-0832
JSON object : View
Products Affected
squid
- squid
CWE