Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g3mg-m63j-55xf

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.

EPSS

Процентиль: 96%
0.23562
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 16 лет назад

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.

redhat
больше 16 лет назад

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.

nvd
больше 16 лет назад

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.

debian
больше 16 лет назад

Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not prope ...

EPSS

Процентиль: 96%
0.23562
Средний

Дефекты

CWE-119