{ "id": "CVE-2007-6239", "sourceIdentifier": "secalert@redhat.com", "published": "2007-12-04T18:46:00.000", "lastModified": "2017-09-29T01:29:51.720", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The \"cache update reply processing\" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects." }, { "lang": "es", "value": "La funcionalidad de \"cache update reply processing\" en Squid versiones 2.x anteriores a 2.6.STABLE17 y Squid versi\u00f3n 3.0, permite a atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de vectores desconocidos relacionados con encabezados HTTP y una p\u00e9rdida de memoria de Matriz durante las peticiones de objetos en cach\u00e9." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.0_patch2:*:*:*:*:*:*:*", "matchCriteriaId": "4CE151E1-625E-410C-9D10-714608A00C4C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.1_patch2:*:*:*:*:*:*:*", "matchCriteriaId": "10021E5F-160D-40C0-9435-502B8A404B47" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable4:*:*:*:*:*:*:*", "matchCriteriaId": "43BF62E2-3282-4BB2-8E24-6329BF16C883" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable5:*:*:*:*:*:*:*", "matchCriteriaId": "A2D3DD39-D60E-43C6-96B5-EA86B4885640" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable2:*:*:*:*:*:*:*", "matchCriteriaId": "B2E1146A-A6BB-4DDA-930B-060CFA1C8B6C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable4:*:*:*:*:*:*:*", "matchCriteriaId": "C3546493-F93A-4CF1-B7AA-B37DB7166B84" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable6:*:*:*:*:*:*:*", "matchCriteriaId": "C5913E09-1A69-4677-A307-CB320927CB0B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable7:*:*:*:*:*:*:*", "matchCriteriaId": "2BEAAD41-FD2D-4DE1-A40E-26833E8F4ECB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable11:*:*:*:*:*:*:*", "matchCriteriaId": "CBC75D2D-2A15-4492-B729-52D12FD50DB7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable12:*:*:*:*:*:*:*", "matchCriteriaId": "8BE7D9F6-77BE-468C-8F2B-1DA98FC71E0A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable13:*:*:*:*:*:*:*", "matchCriteriaId": "9AE5D91A-3202-4045-8A83-0EBAA1739D9B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable14:*:*:*:*:*:*:*", "matchCriteriaId": "06DDCB94-4671-4CEB-88DB-0D5C9375A310" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_.stable9:*:*:*:*:*:*:*", "matchCriteriaId": "102085F4-9D6A-4E87-8051-80ACD69292B7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable1:*:*:*:*:*:*:*", "matchCriteriaId": "391FF335-04EA-4DA4-96EA-5A910C0F803D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable3:*:*:*:*:*:*:*", "matchCriteriaId": "8597FD93-C245-4943-B388-94A799810773" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable4:*:*:*:*:*:*:*", "matchCriteriaId": "CFD66C94-F045-4D8D-A961-4CC0F627382F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable5:*:*:*:*:*:*:*", "matchCriteriaId": "DA6AB869-FA31-4A78-ABA8-2F244A6B5872" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable6:*:*:*:*:*:*:*", "matchCriteriaId": "E58DC55D-12A1-473F-AC99-16978035C7B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable7:*:*:*:*:*:*:*", "matchCriteriaId": "3F49FAF5-35D9-4998-9CD8-703C605D1CD6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable8:*:*:*:*:*:*:*", "matchCriteriaId": "49A66778-B985-4CE6-B632-4CE3C7A86593" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable10:*:*:*:*:*:*:*", "matchCriteriaId": "3AD70CCF-DEC6-4CA7-AB43-7982AACE2433" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "41CD3384-FC1E-4C33-98C3-C4227D1F5C41" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable1:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C9587-677C-47D9-B5BB-0A4FDCA76D57" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable2:*:*:*:*:*:*:*", "matchCriteriaId": "1254E804-CDA6-4BD3-BE42-2198CB9172A9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable3:*:*:*:*:*:*:*", "matchCriteriaId": "03163ECC-AE3F-4CE1-B4F6-8C1A0AA12582" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable4:*:*:*:*:*:*:*", "matchCriteriaId": "D8999DFD-0C34-4C7C-8E5F-683F30E4A26D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable5:*:*:*:*:*:*:*", "matchCriteriaId": "79E283CF-F51A-4E4C-9B64-9A0C5ED8A3E2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable6:*:*:*:*:*:*:*", "matchCriteriaId": "21BC9D9D-7C00-4EE7-BDE3-A60753AD644B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable7:*:*:*:*:*:*:*", "matchCriteriaId": "0608AFE2-536F-4938-BEBF-C22DB1C1F1DE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable12:*:*:*:*:*:*:*", "matchCriteriaId": "83E25A57-0BA7-403E-BC38-2E4362D9A4A0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable13:*:*:*:*:*:*:*", "matchCriteriaId": "0CE6F519-C79E-4558-BE4E-1E2C1C9DC40F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable14:*:*:*:*:*:*:*", "matchCriteriaId": "39B6EC86-89E8-43DF-8797-5700FCE97FFE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable15:*:*:*:*:*:*:*", "matchCriteriaId": "A41A3768-68F8-4A32-A701-0E062B746666" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable16:*:*:*:*:*:*:*", "matchCriteriaId": "6AF6506B-7CFA-437D-A62A-D92A6C6A9C01" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "18A99A70-46CE-4F1F-BC50-A9A32DBB511E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre1:*:*:*:*:*:*:*", "matchCriteriaId": "64F8F1B9-A281-47C0-88EB-417A6A5B9F00" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre2:*:*:*:*:*:*:*", "matchCriteriaId": "0EECA433-3770-4ADE-8962-181FCC3590E2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre3:*:*:*:*:*:*:*", "matchCriteriaId": "28613D22-9E8B-4231-9AC9-523D506A200A" } ] } ] } ], "references": [ { "url": "http://bugs.gentoo.org/show_bug.cgi?id=201209", "source": "secalert@redhat.com" }, { "url": "http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html", "source": "secalert@redhat.com" }, { "url": "http://security.gentoo.org/glsa/glsa-200801-05.xml", "source": "secalert@redhat.com" }, { "url": "http://security.gentoo.org/glsa/glsa-200903-38.xml", "source": "secalert@redhat.com" }, { "url": "http://www.debian.org/security/2008/dsa-1482", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://www.kb.cert.org/vuls/id/232881", "source": "secalert@redhat.com", "tags": [ "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:002", "source": "secalert@redhat.com" }, { "url": "http://www.redhat.com/support/errata/RHSA-2007-1130.html", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/26687", "source": "secalert@redhat.com", "tags": [ "Patch" ] }, { "url": "http://www.securitytracker.com/id?1019036", "source": "secalert@redhat.com" }, { "url": "http://www.squid-cache.org/Advisories/SQUID-2007_2.txt", "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.squid-cache.org/Versions/v2/2.6/changesets/11780.patch", "source": "secalert@redhat.com", "tags": [ "Exploit", "Vendor Advisory" ] }, { "url": "http://www.ubuntu.com/usn/usn-565-1", "source": "secalert@redhat.com" }, { "url": "http://www.vupen.com/english/advisories/2007/4066", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=410181", "source": "secalert@redhat.com" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10915", "source": "secalert@redhat.com" }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00497.html", "source": "secalert@redhat.com" }, { "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00507.html", "source": "secalert@redhat.com" } ] }