FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2005-0241

This CVE name corresponds to:

Entered Topic
2005-02-08 squid -- correct handling of oversized HTTP reply headers

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2005-0241
Phase Assigned(20050208)

Description

The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.

References

Source Reference
CONFIRM http://www.squid-cache.org/bugs/show_bug.cgi?id=1216
CONFIRM http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-oversize_reply_headers
CONFIRM http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patch
CONECTIVA CLA-2005:931
FEDORA FLSA-2006:152809
REDHAT RHSA-2005:060
REDHAT RHSA-2005:061
SUSE SUSE-SA:2005:006
CERT-VN VU#823350
BID 12412
OVAL oval:org.mitre.oval:def:10998
SECUNIA 14091
XF squid-http-cache-poisoning(19060)