Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.iss.net/security_center/static/9481.php | vdb-entry x_refsource_XF |
| http://marc.info/?l=bugtraq&m=102674543407606&w=2 | mailing-list x_refsource_BUGTRAQ |
| ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt | vendor-advisory x_refsource_CALDERA |
| http://www.iss.net/security_center/static/9480.php | vdb-entry x_refsource_XF |
| http://www.securityfocus.com/bid/5157 | vdb-entry x_refsource_BID |
| http://www.iss.net/security_center/static/9482.php | vdb-entry x_refsource_XF |
| http://www.squid-cache.org/Versions/v2/2.4/bugs/ | x_refsource_CONFIRM |
| http://rhn.redhat.com/errata/RHSA-2002-051.html | vendor-advisory x_refsource_REDHAT |
| http://www.securityfocus.com/bid/5155 | vdb-entry x_refsource_BID |
| http://www.securityfocus.com/bid/5156 | vdb-entry x_refsource_BID |
| http://www.squid-cache.org/Advisories/SQUID-2002_3.txt | x_refsource_CONFIRM |
| http://rhn.redhat.com/errata/RHSA-2002-130.html | vendor-advisory x_refsource_REDHAT |
| http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php | vendor-advisory x_refsource_MANDRAKE |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|