First published: Sun Feb 06 2005(Updated: )
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.5.6 | |
Squid Web Proxy Cache | =2.5.stable1 | |
Squid Web Proxy Cache | =2.5.stable2 | |
Squid Web Proxy Cache | =2.5.stable3 | |
Squid Web Proxy Cache | =2.5.stable4 | |
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.5.stable7 | |
Squid Web Proxy Cache | =2.5_.stable1 | |
Squid Web Proxy Cache | =2.5_.stable3 | |
Squid Web Proxy Cache | =2.5_.stable4 | |
Squid Web Proxy Cache | =2.5_.stable5 | |
Squid Web Proxy Cache | =2.5_.stable6 | |
Squid Web Proxy Cache | =2.5_stable3 | |
Squid Web Proxy Cache | =2.5_stable4 | |
Squid Web Proxy Cache | =2.5_stable9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0174 is considered a medium severity vulnerability that allows cache poisoning and may lead to certain attacks.
To fix CVE-2005-0174, update Squid to a version later than 2.5.STABLE7.
CVE-2005-0174 affects Squid versions 2.5 up to 2.5.STABLE7.
CVE-2005-0174 allows attackers to poison the cache or conduct attacks through malformed HTTP headers.
Yes, a patch is available through newer versions of Squid beyond 2.5.STABLE7.