Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
Link | Tags |
---|---|
http://www.squid-cache.org/Versions/v2/2.4/bugs/ | exploit |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000464 | vendor advisory |
http://www.novell.com/linux/security/advisories/2002_008_squid_txt.html | vendor advisory |
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-016.php | vendor advisory |
http://marc.info/?l=bugtraq&m=101440163111826&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=101443252627021&w=2 | mailing list |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc | vendor advisory |
http://archives.neohapsis.com/archives/linux/caldera/2002-q1/0014.html | vendor advisory |
http://marc.info/?l=bugtraq&m=101431040422095&w=2 | mailing list |
http://www.redhat.com/support/errata/RHSA-2002-029.html | patch vendor advisory |
http://www.caldera.com/support/security/advisories/CSSA-2002-010.0.txt | vendor advisory |
http://www.osvdb.org/5378 | vdb entry |
http://www.iss.net/security_center/static/8258.php | vdb entry |
http://www.securityfocus.com/bid/4148 | vdb entry |