Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2002-051.html | vendor advisory |
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-027.php | vendor advisory |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-017.1.txt | vendor advisory |
http://marc.info/?l=bugtraq&m=101716495023226&w=2 | mailing list |
http://www.iss.net/security_center/static/8628.php | vdb entry |
http://www.securityfocus.com/bid/4363 | vdb entry |
http://www.squid-cache.org/Advisories/SQUID-2002_2.txt | |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:19.squid.asc | vendor advisory |