Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019 | x_refsource_CONFIRM |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/53922 | vdb-entry x_refsource_XF |
| http://www.vupen.com/english/advisories/2009/3013 | vdb-entry x_refsource_VUPEN |
| http://securitytracker.com/id?1023079 | vdb-entry x_refsource_SECTRACK |
| http://secunia.com/advisories/37107 | third-party-advisory x_refsource_SECUNIA |
| http://www.vupen.com/english/advisories/2010/1043 | vdb-entry x_refsource_VUPEN |
| http://www.osvdb.org/59164 | vdb-entry x_refsource_OSVDB |
| http://www.debian.org/security/2010/dsa-2040 | vendor-advisory x_refsource_DEBIAN |
| http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html | vendor-advisory x_refsource_SUSE |
| http://www.securityfocus.com/bid/36800 | vdb-entry x_refsource_BID |
| http://secunia.com/advisories/39679 | third-party-advisory x_refsource_SECUNIA |
| http://www.securityfocus.com/archive/1/507440/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|