Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8v38-vrv4-372w

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.

EPSS

Процентиль: 94%
0.14419
Средний

Связанные уязвимости

ubuntu
больше 20 лет назад

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.

redhat
почти 21 год назад

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.

nvd
больше 20 лет назад

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2.5.6 and earlier, with NTLM authentication enabled, allow remote attackers to cause a denial of service (application crash) via an NTLMSSP packet that causes a negative value to be passed to memcpy.

debian
больше 20 лет назад

The (1) ntlm_fetch_string and (2) ntlm_get_string functions in Squid 2 ...

EPSS

Процентиль: 94%
0.14419
Средний