Description
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
Product(s):
- Squid 2.0 Patch 2
- Squid 2.1 Patch 2
- Squid 2.3_.STABLE4
- Squid 2.3_.STABLE5
- Squid 2.3 Stable5
- Squid 2.4
- Squid 2.4 Stable 2
- Squid 2.4 Stable 6
- Squid 2.4_.stable7
- Squid 2.4_stable7
- Squid 2.5.6
- Squid 2.5.stable1
- Squid 2.5.stable2
- Squid 2.5.stable3
- Squid 2.5.stable4
- Squid 2.5.stable5
- Squid 2.5.stable6
- Squid 2.5.stable7
- Squid 2.5_.stable1
- Squid 2.5_.stable3
- Squid 2.5_.stable4
- Squid 2.5_.stable5
- Squid 2.5_.stable6
- Squid 2.5 Stable3
- Squid 2.5 Stable4
- Squid 2.5 Stable9
- Squid 2.6.stable1
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0095, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0095 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.