Description
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
Product(s):
- Squid 2.0 Patch 1
- Squid 2.0 Patch 2
- Squid 2.0 Pre 1
- Squid 2.0 Release
- Squid 2.1 Patch 1
- Squid 2.1 Patch 2
- Squid 2.1 Pre 1
- Squid 2.1 Pre 3
- Squid 2.1 Pre 4
- Squid 2.1 Release
- Squid 2.2 Devel 3
- Squid 2.2 Devel 4
- Squid 2.2 Pre 1
- Squid 2.2 Pre2
- Squid 2.2 Stable1
- Squid 2.2 Stable2
- Squid 2.2 Stable3
- Squid 2.2 Stable4
- Squid 2.2 Stable5
- Squid 2.3 Devel2
- Squid 2.3 Devel3
- Squid 2.3 Stable1
- Squid 2.3 Stable2
- Squid 2.3.STABLE3
- Squid 2.3.STABLE4
- Squid 2.3.STABLE5
- Squid 2.3_.STABLE4
- Squid 2.3_.STABLE5
- Squid 2.3 Stable5
- Squid 2.4 Stable1
- Squid 2.4 Stable2
- Squid 2.4 Stable3
- Squid 2.4 Stable4
- Squid 2.4 Stable 6
- Squid 2.4 Stable 7
- Squid 2.4
- Squid 2.4 Stable 2
- Squid 2.4_.stable7
- Squid 2.4_stable7
- Squid 2.5.6
- Squid 2.5.stable1
- Squid 2.5.stable2
- Squid 2.5.stable3
- Squid 2.5.stable4
- Squid 2.5.stable5
- Squid 2.5.stable6
- Squid 2.5.stable7
- Squid 2.5_.stable1
- Squid 2.5_.stable3
- Squid 2.5_.stable4
- Squid 2.5_.stable5
- Squid 2.5_.stable6
- Squid 2.5 Stable3
- Squid 2.5 Stable4
- Squid 2.5 Stable9
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0718, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0718 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.