CVE-2009-0478

Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid:squid:2.7.stable1:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.7.stable2:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.7.stable3:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.7.stable4:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:2.7.stable5:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable1:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable2:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable3:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable4:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable5:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable6:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable7:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable8:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable9:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable10:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable11:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.0.stable12:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.1:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squid:squid:3.1.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html -
References () http://secunia.com/advisories/33731 - Vendor Advisory () http://secunia.com/advisories/33731 - Vendor Advisory
References () http://secunia.com/advisories/34467 - Vendor Advisory () http://secunia.com/advisories/34467 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200903-38.xml - () http://security.gentoo.org/glsa/glsa-200903-38.xml -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:034 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:034 -
References () http://www.securityfocus.com/archive/1/500653/100/0/threaded - () http://www.securityfocus.com/archive/1/500653/100/0/threaded -
References () http://www.securityfocus.com/bid/33604 - Exploit, Patch () http://www.securityfocus.com/bid/33604 - Exploit, Patch
References () http://www.securitytracker.com/id?1021684 - () http://www.securitytracker.com/id?1021684 -
References () http://www.squid-cache.org/Advisories/SQUID-2009_1.txt - Vendor Advisory () http://www.squid-cache.org/Advisories/SQUID-2009_1.txt - Vendor Advisory
References () http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch - Vendor Advisory () http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=484246 - () https://bugzilla.redhat.com/show_bug.cgi?id=484246 -
References () https://www.exploit-db.com/exploits/8021 - () https://www.exploit-db.com/exploits/8021 -

Information

Published : 2009-02-08 22:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0478

Mitre link : CVE-2009-0478

CVE.ORG link : CVE-2009-0478


JSON object : View

Products Affected

squid

  • squid
CWE
CWE-20

Improper Input Validation