Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c92g-qcfc-4869

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

EPSS

Процентиль: 99%
0.75791
Высокий

Связанные уязвимости

ubuntu
почти 21 год назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

redhat
около 21 года назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

nvd
почти 21 год назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

debian
почти 21 год назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function ...

EPSS

Процентиль: 99%
0.75791
Высокий