cvelist/2011/3xxx/CVE-2011-3205.json
2019-03-18 00:21:39 +00:00

182 lines
6.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3205",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:1293",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-1293.html"
},
{
"name": "46029",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/46029"
},
{
"name": "45906",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45906"
},
{
"name": "FEDORA-2011-11854",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html"
},
{
"name": "SUSE-SU-2016:1996",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
},
{
"name": "SUSE-SU-2011:1019",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html"
},
{
"name": "1025981",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1025981"
},
{
"name": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch"
},
{
"name": "http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch"
},
{
"name": "45965",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45965"
},
{
"name": "45805",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45805"
},
{
"name": "DSA-2304",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2304"
},
{
"name": "[oss-security] 20110830 Re: CVE-request(?): squid: buffer overflow in Gopher reply parser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/08/30/8"
},
{
"name": "http://www.squid-cache.org/Advisories/SQUID-2011_3.txt",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Advisories/SQUID-2011_3.txt"
},
{
"name": "openSUSE-SU-2011:1018",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html"
},
{
"name": "[oss-security] 20110829 CVE-request(?): squid: buffer overflow in Gopher reply parser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/08/29/2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=734583",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=734583"
},
{
"name": "[oss-security] 20110830 Re: CVE-request(?): squid: buffer overflow in Gopher reply parser",
"refsource": "MLIST",
"url": "http://openwall.com/lists/oss-security/2011/08/30/4"
},
{
"name": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch",
"refsource": "CONFIRM",
"url": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch"
},
{
"name": "SUSE-SU-2016:2089",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
},
{
"name": "49356",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/49356"
},
{
"name": "74847",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/74847"
},
{
"name": "45920",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/45920"
},
{
"name": "MDVSA-2011:150",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:150"
}
]
}
}