First published: Tue Feb 08 2005(Updated: )
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.5.stable1 | |
Squid Web Proxy Cache | =2.5.stable2 | |
Squid Web Proxy Cache | =2.5.stable3 | |
Squid Web Proxy Cache | =2.5.stable4 | |
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.5.stable7 |
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patch
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0241 has a medium severity rating due to potential cache poisoning and access control bypass risks.
To fix CVE-2005-0241, upgrade to a version of Squid newer than 2.5-STABLE7.
CVE-2005-0241 affects Squid versions 2.5-STABLE1 through 2.5-STABLE7.
The impacts of CVE-2005-0241 include cache poisoning and the ability for attackers to bypass access controls.
Yes, CVE-2005-0241 can be exploited by remote attackers if systems are running affected versions of Squid.