First published: Wed Mar 21 2007(Updated: )
The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =2.6.stable1 | |
Squid Web Proxy Cache | =2.6.stable2 | |
Squid Web Proxy Cache | =2.6.stable3 | |
Squid Web Proxy Cache | =2.6.stable4 | |
Squid Web Proxy Cache | =2.6.stable5 | |
Squid Web Proxy Cache | =2.6.stable6 | |
Squid Web Proxy Cache | =2.6.stable7 | |
Squid Web Proxy Cache | =2.6.stable8 | |
Squid Web Proxy Cache | =2.6.stable9 | |
Squid Web Proxy Cache | =2.6.stable10 | |
Squid Web Proxy Cache | =2.6.stable11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1560 is classified as a high severity vulnerability due to its ability to cause a denial of service through a daemon crash.
To mitigate CVE-2007-1560, upgrade to Squid version 2.6.STABLE12 or later.
CVE-2007-1560 allows remote attackers to exploit crafted TRACE requests, leading to potential service interruptions.
CVE-2007-1560 affects Squid versions 2.6.STABLE1 through 2.6.STABLE11.
CVE-2007-1560 leverages malformed TRACE requests to trigger an assertion error in the Squid daemon.