First published: Sat Mar 12 2005(Updated: )
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.5_stable9 | |
Squid Web Proxy Cache | =2.3.stable3 | |
Squid Web Proxy Cache | =2.2.stable2 | |
Squid Web Proxy Cache | =2.5_.stable3 | |
Squid Web Proxy Cache | =2.1_patch2 | |
Squid Web Proxy Cache | =2.2.stable3 | |
Squid Web Proxy Cache | =2.0.patch2 | |
Squid Web Proxy Cache | =2.4_.stable7 | |
Squid Web Proxy Cache | =2.1.patch2 | |
Squid Web Proxy Cache | =2.5.stable5 | |
Squid Web Proxy Cache | =2.2.stable4 | |
Squid Web Proxy Cache | =2.0.patch1 | |
Squid Web Proxy Cache | =2.0_patch2 | |
Squid Web Proxy Cache | =2.5_stable3 | |
Squid Web Proxy Cache | =2.1.patch1 | |
Squid Web Proxy Cache | =2.4_.stable2 | |
Squid Web Proxy Cache | =2.3_.stable4 | |
Squid Web Proxy Cache | =2.3.devel3 | |
Squid Web Proxy Cache | =2.5.stable3 | |
Squid Web Proxy Cache | =2.4.stable4 | |
Squid Web Proxy Cache | =2.3_.stable5 | |
Squid Web Proxy Cache | =2.1.release | |
Squid Web Proxy Cache | =2.5.6 | |
Squid Web Proxy Cache | =2.5.stable1 | |
Squid Web Proxy Cache | =2.0.release | |
Squid Web Proxy Cache | =2.1.pre4 | |
Squid Web Proxy Cache | =2.1.pre3 | |
Squid Web Proxy Cache | =2.3.stable1 | |
Squid Web Proxy Cache | =2.4.stable7 | |
Squid Web Proxy Cache | =2.5_.stable5 | |
Squid Web Proxy Cache | =2.2.devel4 | |
Squid Web Proxy Cache | =2.4_stable7 | |
Squid Web Proxy Cache | =2.5.stable6 | |
Squid Web Proxy Cache | =2.3.stable2 | |
Squid Web Proxy Cache | =2.4.stable1 | |
Squid Web Proxy Cache | =2.5_.stable6 | |
Squid Web Proxy Cache | =2.2.stable1 | |
Squid Web Proxy Cache | =2.5.stable4 | |
Squid Web Proxy Cache | =2.5.stable2 | |
Squid Web Proxy Cache | =2.3.stable4 | |
Squid Web Proxy Cache | =2.1.pre1 | |
Squid Web Proxy Cache | =2.4.stable2 | |
Squid Web Proxy Cache | =2.2.pre1 | |
Squid Web Proxy Cache | =2.4_.stable6 | |
Squid Web Proxy Cache | =2.2.devel3 | |
Squid Web Proxy Cache | =2.5_.stable1 | |
Squid Web Proxy Cache | =2.4.stable3 | |
Squid Web Proxy Cache | =2.3_stable5 | |
Squid Web Proxy Cache | =2.4 | |
Squid Web Proxy Cache | =2.5_.stable4 | |
Squid Web Proxy Cache | =2.3.stable5 | |
Squid Web Proxy Cache | =2.5_stable4 | |
Squid Web Proxy Cache | =2.2.stable5 | |
Squid Web Proxy Cache | =2.2.pre2 | |
Squid Web Proxy Cache | =2.0.pre1 | |
Squid Web Proxy Cache | =2.4.stable6 | |
Squid Web Proxy Cache | =2.3.devel2 | |
Squid Web Proxy Cache | =2.5.stable7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0718 is categorized as a denial of service vulnerability due to segmentation faults leading to service interruptions.
To mitigate CVE-2005-0718, upgrade to Squid version 2.5.STABLE9 or later, which includes patches for this vulnerability.
CVE-2005-0718 affects Squid versions 2.5.STABLE7 and earlier, including various releases such as 2.4 and 2.2.
CVE-2005-0718 can cause Squid to crash unexpectedly, resulting in interruptions in proxy service and degraded performance.
Yes, CVE-2005-0718 can be exploited remotely by attackers who send specially crafted PUT or POST requests.