CVE-2014-3609

HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted "Range headers with unidentifiable byte-range values."
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.1.15:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.18:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.0.19:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.10:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.11:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.2.12:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.5:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.6:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.7:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.8:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.9:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.10:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.3.11:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.1:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.2:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.3:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.4:*:*:*:*:*:*:*
cpe:2.3:a:squid-cache:squid:3.4.5:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00025.html - () http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00025.html -
References () http://lists.opensuse.org/opensuse-updates/2014-09/msg00029.html - () http://lists.opensuse.org/opensuse-updates/2014-09/msg00029.html -
References () http://rhn.redhat.com/errata/RHSA-2014-1147.html - () http://rhn.redhat.com/errata/RHSA-2014-1147.html -
References () http://secunia.com/advisories/60179 - () http://secunia.com/advisories/60179 -
References () http://secunia.com/advisories/60334 - () http://secunia.com/advisories/60334 -
References () http://secunia.com/advisories/61320 - () http://secunia.com/advisories/61320 -
References () http://secunia.com/advisories/61412 - () http://secunia.com/advisories/61412 -
References () http://www.debian.org/security/2014/dsa-3014 - () http://www.debian.org/security/2014/dsa-3014 -
References () http://www.debian.org/security/2015/dsa-3139 - () http://www.debian.org/security/2015/dsa-3139 -
References () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html - () http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html -
References () http://www.securityfocus.com/bid/69453 - () http://www.securityfocus.com/bid/69453 -
References () http://www.squid-cache.org/Advisories/SQUID-2014_2.txt - Vendor Advisory () http://www.squid-cache.org/Advisories/SQUID-2014_2.txt - Vendor Advisory
References () http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9201.patch - () http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9201.patch -
References () http://www.ubuntu.com/usn/USN-2327-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-2327-1 - Vendor Advisory

Information

Published : 2014-09-11 18:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3609

Mitre link : CVE-2014-3609

CVE.ORG link : CVE-2014-3609


JSON object : View

Products Affected

squid-cache

  • squid
CWE
CWE-20

Improper Input Validation