Описание
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 3.1.16-1ubuntu1 |
hardy | not-affected | code not present |
lucid | not-affected | code not present |
maverick | released | 3.1.6-1.1ubuntu1.2 |
natty | released | 3.1.11-1ubuntu0.1 |
oneiric | released | 3.1.14-1ubuntu0.1 |
upstream | released | 3.1.16-1 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
The idnsGrokReply function in Squid before 3.1.16 does not properly fr ...
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
EPSS
5 Medium
CVSS2