Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2005-0241

CVE information

Published

17 years ago

Last Modified

5 years ago

CVSSv2.0 Severity

Medium

Impact Analysis

Description

The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size..

CVSSv2.0 Score

Severity
Medium
Base Score
5/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
None
Integrity Impact
Partial

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:squid:squid:2.5.stable5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:squid:squid:2.5.stable7:*:*:*:*:*:*:*
  Yes
- -