Filtered by vendor Squid Subscriptions
Total 41 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2005-0718 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (segmentation fault) by aborting the connection during a (1) PUT or (2) POST request, which causes Squid to access previously freed memory.
CVE-2005-0094 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Buffer overflow in the gopherToHTML function in the Gopher reply parser for Squid 2.5.STABLE7 and earlier allows remote malicious Gopher servers to cause a denial of service (crash) via crafted responses.
CVE-2005-0095 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
The WCCP message parsing code in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via malformed WCCP messages with source addresses that are spoofed to reference Squid's home router and invalid WCCP_I_SEE_YOU cache numbers.
CVE-2005-0173 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
squid_ldap_auth in Squid 2.5 and earlier allows remote authenticated users to bypass username-based Access Control Lists (ACLs) via a username with a space at the beginning or end, which is ignored by the LDAP server.
CVE-2005-0241 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
CVE-2004-2654 1 Squid 1 Squid 2025-04-03 N/A
The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference. NOTE: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5.
CVE-2005-2917 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
CVE-2005-1519 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.
CVE-2002-0163 2 Redhat, Squid 2 Linux, Squid 2025-04-03 N/A
Heap-based buffer overflow in Squid before 2.4 STABLE4, and Squid 2.5 and 2.6 until March 12, 2002 distributions, allows remote attackers to cause a denial of service, and possibly execute arbitrary code, via compressed DNS responses.
CVE-2002-0068 2 Redhat, Squid 2 Linux, Squid 2025-04-03 N/A
Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
CVE-2005-3258 1 Squid 1 Squid 2025-04-03 N/A
The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11 and earlier allows remote FTP servers to cause a denial of service (segmentation fault) via certain "odd" responses.
CVE-2005-3322 2 Squid, Suse 2 Squid, Suse Linux 2025-04-03 N/A
Unspecified vulnerability in Squid on SUSE Linux 9.0 allows remote attackers to cause a denial of service (crash) via HTTPs (SSL).
CVE-2005-1711 3 Clam Anti-virus, Gibraltar, Squid 3 Clamav, Gibraltar Firewall, Squid 2025-04-03 N/A
Gibraltar Firewall 2.2 and earlier, when using the ClamAV update to 0.81 for Squid, uses a defunct ClamAV method to scan memory for viruses, which does not return an error code and prevents viruses from being detected.
CVE-2005-1345 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5.STABLE9 and earlier does not trigger a fatal error when it identifies missing or invalid ACLs in the http_access configuration, which could lead to less restrictive ACLs than intended by the administrator.
CVE-2005-0097 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
The NTLM component in Squid 2.5.STABLE7 and earlier allows remote attackers to cause a denial of service (crash) via a malformed NTLM type 3 message that triggers a NULL dereference.
CVE-2005-0174 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
CVE-2005-0175 2 Redhat, Squid 2 Enterprise Linux, Squid 2025-04-03 N/A
Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache via an HTTP response splitting attack.
CVE-2005-0194 1 Squid 1 Squid 2025-04-03 N/A
Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings.
CVE-2002-0714 2 Redhat, Squid 3 Enterprise Linux, Linux, Squid 2025-04-03 N/A
FTP proxy in Squid before 2.4.STABLE6 does not compare the IP addresses of control and data connections with the FTP server, which allows remote attackers to bypass firewall rules or spoof FTP server responses.
CVE-2002-0067 2 Redhat, Squid 2 Linux, Squid 2025-04-03 N/A
Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions.