First published: Sun Feb 06 2005(Updated: )
Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.5.stable4 | |
Squid Web Proxy Cache | =2.5.stable2 | |
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.5.stable3 | |
Squid Web Proxy Cache | =2.5.stable1 | |
Debian GNU/Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0211 is classified as a critical vulnerability due to its potential for remote code execution and denial of service.
The solution for CVE-2005-0211 is to upgrade to Squid version 2.5.STABLE7 or later.
CVE-2005-0211 affects all versions of Squid 2.5 prior to 2.5.STABLE7, including Squid 2.5.STABLE1 to 2.5.STABLE6.
CVE-2005-0211 allows remote attackers to execute arbitrary code and cause denial of service through crafted WCCP packets.
Yes, CVE-2005-0211 involves a buffer overflow due to improper handling of length parameters in the recvfrom function.