First published: Wed Jul 18 2001(Updated: )
Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SCO OpenLinux Server | =3.1 | |
Immunix | =6.2 | |
Immunix | =7.0 | |
Immunix | =7.0_beta | |
Mandrakesoft Mandrake Single Network Firewall | =7.2 | |
Squid Web Proxy Cache | =2.3stable3 | |
Squid Web Proxy Cache | =2.3stable4 | |
mandrakesoft mandrake linux | =7.1 | |
mandrakesoft mandrake linux | =7.2 | |
mandrakesoft mandrake linux | =8.0 | |
Mandriva Linux Corporate Server | =1.0.1 | |
redhat linux | =7.0 | |
Trustix Secure Linux | =1.1 | |
Trustix Secure Linux | =1.01 | |
Trustix Secure Linux | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1030 is considered a high severity vulnerability due to its potential to allow unauthorized access and activities.
To fix CVE-2001-1030, upgrade to a version of Squid that is 2.3STABLE5 or newer, which includes the necessary ACL enforcement.
CVE-2001-1030 affects versions of Squid before 2.3STABLE5 and several specific operating systems like Red Hat Linux, Immunix, and Mandrake Linux.
CVE-2001-1030 can allow attackers to bypass access control lists, enabling unauthorized actions such as port scanning.
If upgrading is not feasible, configuring more restrictive access control settings and monitoring network traffic may help mitigate the risks associated with CVE-2001-1030.