Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-0639

Опубликовано: 12 фев. 2010
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.

Отчет

Not vulnerable. This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 3, 4, or 5. Those versions are not compiled with the support for HTCP protocol.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=565426squid: HTCP packet temporary DoS (SQUID-2010:2)

EPSS

Процентиль: 98%
0.49372
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.

nvd
почти 16 лет назад

The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.

debian
почти 16 лет назад

The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.ST ...

github
больше 3 лет назад

The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.

EPSS

Процентиль: 98%
0.49372
Средний

4.3 Medium

CVSS2