Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Secunia - Advisories - Squid "sslConnectTimeout()" Denial of Service Vulnerability
[go: Go Back, main page]


Secunia - Stay Secure
Secunia monitors vulnerabilities in more than 6500 products, e.g.:
Internet Explorer | Mozilla Firefox | Opera | View All Products
Home >> Secunia Advisories >> Squid "sslConnectTimeout()" Denial of Service Vulnerability

Secunia Advisories
Historic Advisories
Listed By Product
Listed By Vendor
Statistics
About Advisories
Secunia Research

Virus Information
Chronological List
Last 10 Virus Alerts
About Virus Info

Secunia Advisories
Weekly Summary
Secunia Virus Alerts


Squid "sslConnectTimeout()" Denial of Service Vulnerability

Secunia Advisory:SA16674Print Advisory  
Release Date:2005-09-02
Last Update:2005-09-13

Critical:
Moderately critical
Impact:DoS
Where:From remote
Solution Status:Vendor Patch

Software:Squid 2.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

CVE reference:CAN-2005-2796

Description:
Alex Masterov has reported a vulnerability in Squid, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error in the "sslConnectTimeout()" function after handling malformed requests. This may be exploited to crash Squid.

Solution:
Apply patch for 2.5.STABLE10:
http://www.squid-cache.org/Versi...STABLE10-sslConnectTimeout.patch

Provided and/or discovered by:
Alex Masterov

Changelog:
2005-09-13: Added CVE reference.

Original Advisory:
http://www.squid-cache.org/Versi...d-2.5.STABLE10-sslConnectTimeout


Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia:

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback is most welcome.


Found: 17 Related Secunia Security Advisories, displaying 10

- Squid FTP Server Response Handling Denial of Service
- Squid NTLM Authentication Handling Denial of Service
- Squid "storeBuffer()" Denial of Service Vulnerability
- Squid DNS Lookup Spoofing Vulnerability
- Squid HTTP Specifications Web Proxy Cache Poisoning
- Squid Set-Cookie Header Leak Security Issue
- Squid FQDN Lookup Denial of Service Vulnerability
- Squid Oversized Reply Header Handling Security Issue
- Squid WCCP Message Handling Buffer Overflow Vulnerability
- Squid Username Whitespace Security Bypass Issue

Show all related advisories


Receive all Secunia Security Advisories Free:


Read more about our mailing list.





Search



Secunia News

2005-11-21
Proof of Concept code has been released for a 6 months old Internet Explorer vulnerability. Criticality rating increased to Extremely Critical.

- - - - - - - - -

2005-06-21
Multiple browsers are vulnerable to the Dialog Origin Spoofing Vulnerability.

- - - - - - - - -

2005-04-04
Various Mozilla browsers are vulnerable to the Mozilla Arbitrary Memory Exposure Vulnerability.

- - - - - - - - -

2005-03-17
Want a new IT Security job?
Vacant positions at Secunia


Secunia Feeds

Secunia Advisories
Get the RSS feed or use our HTML version.

Secunia Virus Alerts
Get the RSS feed.

Special Requests
Special requests for your website can be sent to our support, or read more about featuring Secunia information here.


Terms & Conditions - Confidentiality - Copyright Secunia - Compliance - Contact Secunia