First published: Fri Mar 08 2002(Updated: )
Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=2.4_stable_2 | |
Red Hat Linux | =7.2 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0067 is considered a moderate severity vulnerability due to its potential to allow remote attackers to bypass access controls.
To fix CVE-2002-0067, update to a later version of Squid that properly disables HTCP by default.
CVE-2002-0067 affects Squid version 2.4 STABLE3 and earlier.
An attacker exploiting CVE-2002-0067 could bypass intended access restrictions, gaining unauthorized access to information.
CVE-2002-0067 is primarily associated with Red Hat Linux versions 6.2, 7.0, 7.1, and 7.2 that utilize vulnerable Squid versions.