Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
References
Configurations
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://fedoranews.org/updates/FEDORA--.shtml - | |
References | () http://secunia.com/advisories/15294 - Patch | |
References | () http://www.debian.org/security/2005/dsa-751 - | |
References | () http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2005-489.html - | |
References | () http://www.securityfocus.com/bid/13592 - | |
References | () http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query - Patch | |
References | () http://www.vupen.com/english/advisories/2005/0521 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9976 - |
Information
Published : 2005-05-11 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1519
Mitre link : CVE-2005-1519
CVE.ORG link : CVE-2005-1519
JSON object : View
Products Affected
squid
- squid
CWE