First published: Sun Feb 06 2005(Updated: )
Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.3.stable3 | |
Squid Web Proxy Cache | =2.2.stable2 | |
Squid Web Proxy Cache | =2.2.stable3 | |
Squid Web Proxy Cache | =2.0.patch2 | |
Squid Web Proxy Cache | =2.1.patch2 | |
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.2.stable4 | |
Squid Web Proxy Cache | =2.0.patch1 | |
Squid Web Proxy Cache | =2.1.patch1 | |
Squid Web Proxy Cache | =2.3.devel3 | |
Squid Web Proxy Cache | =2.5.stable3 | |
Squid Web Proxy Cache | =2.4.stable4 | |
Squid Web Proxy Cache | =2.1.release | |
Squid Web Proxy Cache | =2.5.stable1 | |
Squid Web Proxy Cache | =2.0.release | |
Squid Web Proxy Cache | =2.1.pre4 | |
Squid Web Proxy Cache | =2.1.pre3 | |
Squid Web Proxy Cache | =2.3.stable1 | |
Squid Web Proxy Cache | =2.4.stable7 | |
Squid Web Proxy Cache | =2.2.devel4 | |
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.3.stable2 | |
Squid Web Proxy Cache | =2.4.stable1 | |
Squid Web Proxy Cache | =2.2.stable1 | |
Squid Web Proxy Cache | =2.5.stable4 | |
Squid Web Proxy Cache | =2.5.stable2 | |
Squid Web Proxy Cache | =2.3.stable4 | |
Squid Web Proxy Cache | =2.1.pre1 | |
Squid Web Proxy Cache | =2.4.stable2 | |
Squid Web Proxy Cache | =2.2.pre1 | |
Squid Web Proxy Cache | =2.2.devel3 | |
Squid Web Proxy Cache | =2.4.stable3 | |
Squid Web Proxy Cache | =2.3.stable5 | |
Squid Web Proxy Cache | =2.2.stable5 | |
Squid Web Proxy Cache | =2.2.pre2 | |
Squid Web Proxy Cache | =2.0.pre1 | |
Squid Web Proxy Cache | =2.4.stable6 | |
Squid Web Proxy Cache | =2.3.devel2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0194 has a medium severity rating as it can allow remote attackers to bypass access control lists.
To fix CVE-2005-0194, ensure that all Access Control Lists in the Squid configuration file are properly defined and avoid leaving any ACLs empty.
CVE-2005-0194 affects multiple versions including Squid 2.0.patch1 up to 2.5.stable6.
The exploit vector for CVE-2005-0194 is primarily through misconfiguration of empty Access Control Lists in the Squid configuration.
Ignoring the warnings related to CVE-2005-0194 could lead to unintentional access by remote attackers.