First published: Wed May 11 2005(Updated: )
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | <=2.5_stable9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-1519 is considered to be high due to the potential for remote attackers to spoof DNS lookups.
To fix CVE-2005-1519, you should upgrade to an updated version of Squid that is not affected by this vulnerability.
CVE-2005-1519 affects Squid versions up to and including 2.5 STABLE9.
CVE-2005-1519 can allow an attacker to spoof DNS lookups, potentially redirecting traffic and breaching security.
A possible workaround for CVE-2005-1519 is to filter the DNS client port and implement measures to prevent IP spoofing.