Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-0541

Опубликовано: 06 авг. 2004
Источник: ubuntu
Приоритет: untriaged
EPSS Высокий
CVSS2: 10

Описание

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

РелизСтатусПримечание
dapper

released

2.5.12-4ubuntu2.2
devel

released

2.6.5-4ubuntu2
edgy

released

2.6.1-3ubuntu1.3
feisty

released

2.6.5-4ubuntu2
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 99%
0.75791
Высокий

10 Critical

CVSS2

Связанные уязвимости

redhat
около 21 года назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

nvd
почти 21 год назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

debian
почти 21 год назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function ...

github
около 3 лет назад

Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable).

EPSS

Процентиль: 99%
0.75791
Высокий

10 Critical

CVSS2