First published: Sun Feb 06 2005(Updated: )
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Squid | =2.5_stable9 | |
Squid Squid | =2.5_.stable3 | |
Squid Squid | =2.5.stable5 | |
Squid Squid | =2.5_stable3 | |
Squid Squid | =2.5.stable3 | |
Squid Squid | =2.5.6 | |
Squid Squid | =2.5.stable1 | |
Squid Squid | =2.5_.stable5 | |
Squid Squid | =2.5.stable6 | |
Squid Squid | =2.5_.stable6 | |
Squid Squid | =2.5.stable4 | |
Squid Squid | =2.5.stable2 | |
Squid Squid | =2.5_.stable1 | |
Squid Squid | =2.5_.stable4 | |
Squid Squid | =2.5_stable4 | |
Squid Squid | =2.5.stable7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.