Описание
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.16-1ubuntu1 |
| hardy | not-affected | code not present |
| lucid | not-affected | code not present |
| maverick | released | 3.1.6-1.1ubuntu1.2 |
| natty | released | 3.1.11-1ubuntu0.1 |
| oneiric | released | 3.1.14-1ubuntu0.1 |
| upstream | released | 3.1.16-1 |
Показывать по
Ссылки на источники
5 Medium
CVSS2
Связанные уязвимости
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
The idnsGrokReply function in Squid before 3.1.16 does not properly fr ...
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
5 Medium
CVSS2