[CVE-2007-6239] squid-2.X and squid-3.x are vulnerable
Bug #174352 reported by
Stephan Rügamer
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
squid (Debian) |
Fix Released
|
Unknown
|
|||
squid (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Edgy |
Invalid
|
Undecided
|
Unassigned | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned | ||
squid3 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Edgy |
Invalid
|
Undecided
|
Unassigned | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned | ||
Gutsy |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: squid
Dear colleagues,
squid-2.X and squid-3.x are vulnerable.
Message from NVD:
The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers.
This applies to all squid packages in our supported releases.
Severity: (from upstream: http://
This problem allows any client trusted to use the service to
perform a denial of service attack on the Squid service.
CVE References
description: | updated |
Changed in squid: | |
status: | Unknown → Fix Committed |
Changed in squid: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
This is fixed by http:// www.ubuntu. com/usn/ usn-565- 1.
Thanks
chuck