First published: Thu Mar 03 2005(Updated: )
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cookies in caches, may cause Set-Cookie headers to be sent to other users, which allows attackers to steal the related cookies.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.5.stable7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0626 is classified as a medium severity vulnerability due to the potential for cookie theft.
Fix CVE-2005-0626 by upgrading to a later stable version of Squid that addresses the race condition.
CVE-2005-0626 affects Squid versions 2.5.STABLE7 to 2.5.STABLE9.
The implications of CVE-2005-0626 include the possibility of attackers stealing cookies, which may lead to session hijacking.
A recommended workaround for CVE-2005-0626 is disabling cookie caching in Squid until an upgrade is feasible.