Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4115

Опубликовано: 09 авг. 2013
Источник: debian
EPSS Средний

Описание

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
squidnot-affectedpackage
squid3fixed3.3.8-1package
squid3not-affectedwheezypackage
squid3not-affectedsqueezepackage

Примечания

  • http://www.squid-cache.org/Advisories/SQUID-2013_2.txt

EPSS

Процентиль: 98%
0.65539
Средний

Связанные уязвимости

ubuntu
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

redhat
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

nvd
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

github
больше 3 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

oracle-oval
почти 11 лет назад

ELSA-2014-1148: squid security update (IMPORTANT)

EPSS

Процентиль: 98%
0.65539
Средний