René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

257 lines
9.4 KiB
JSON

{
"id": "CVE-2009-2622",
"sourceIdentifier": "cret@cert.org",
"published": "2009-07-28T17:30:01.127",
"lastModified": "2009-08-12T05:30:32.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) \"missing or mismatched protocol identifier,\" (2) missing or negative status value,\" (3) \"missing version,\" or (4) \"missing or invalid status number,\" related to (a) HttpMsg.cc and (b) HttpReply.cc."
},
{
"lang": "es",
"value": "Squid desde v3.0 hasta v3.0.STABLE16 y desde v3.1 hasta v3.1.0.11 permite a atacantes remotos producir una denegaci\u00f3n de servicio a trav\u00e9s de peticiones mal formadas que incluyen (1) \"identificador de protocolo perdido o mal utilizado,\" (2) \"valor de estatus perdido o negativo,\" (3) \"versi\u00f3n perdida,\" o (4) \"n\u00famero de estatus perdido o inv\u00e1lido\", relacionado con HttpMsg.cc y (b) HttpReply.cc."
}
],
"vendorComments": [
{
"organization": "Red Hat",
"comment": "Not vulnerable. This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
"lastModified": "2009-08-06T00:00:00"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre1:*:*:*:*:*",
"matchCriteriaId": "CF9C0078-D06B-4174-AF2C-599638E5B29D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre2:*:*:*:*:*",
"matchCriteriaId": "F1DD47BA-EA59-4DCC-BFF3-2DF0BC332CBB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre3:*:*:*:*:*",
"matchCriteriaId": "2BC1746D-BE02-4D04-B31D-95589EBD4C93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre4:*:*:*:*:*",
"matchCriteriaId": "62C35710-215C-4B80-9304-665451F3C0AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre5:*:*:*:*:*",
"matchCriteriaId": "76A7416C-64B2-4F52-93FD-9C504B7D4F40"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre6:*:*:*:*:*",
"matchCriteriaId": "17D51261-2071-4E8F-AD75-2ECCBE7F7C04"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre7:*:*:*:*:*",
"matchCriteriaId": "ACD9E084-007E-4C6A-8D30-2DC9B355D7B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable1:*:*:*:*:*",
"matchCriteriaId": "95912E0D-FACF-459B-94FB-334FDBCC292B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable10:*:*:*:*:*",
"matchCriteriaId": "2C455506-7FBF-4F0E-92E7-F074B74C10D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable11:*:*:*:*:*",
"matchCriteriaId": "67288E3E-88BF-44CE-84EF-1BF98E8C38CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable12:*:*:*:*:*",
"matchCriteriaId": "B428BDA9-8C83-4DE3-9391-17AFD5D750BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable13:*:*:*:*:*",
"matchCriteriaId": "DC57EAB8-BFEF-4FE2-8ADB-D196EAE3E51D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable14:*:*:*:*:*",
"matchCriteriaId": "935F2BDE-7F76-4E13-8318-37CE97B7948F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable15:*:*:*:*:*",
"matchCriteriaId": "354599A2-5FCF-4F5A-85AE-00505D32B9BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable2:*:*:*:*:*",
"matchCriteriaId": "1F1BC7B9-9CD1-42E9-84BB-BEE3668BAAA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable3:*:*:*:*:*",
"matchCriteriaId": "88E3716B-863A-40D4-A7D9-F2A288B87394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable4:*:*:*:*:*",
"matchCriteriaId": "02FB3C5B-95F1-4839-8F68-649AFA2FEB1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable5:*:*:*:*:*",
"matchCriteriaId": "631CBA69-B2A1-4522-A330-6A87CCBC682C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable6:*:*:*:*:*",
"matchCriteriaId": "0FE7885D-D1EB-4543-B342-80BC645EE8EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable7:*:*:*:*:*",
"matchCriteriaId": "B7C4AE0E-9608-4D24-8EA3-0F33A5D95A5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable8:*:*:*:*:*",
"matchCriteriaId": "628344A8-42AE-4AD7-89A2-66711490AB30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable9:*:*:*:*:*",
"matchCriteriaId": "3260A290-9F63-4E5C-BEF2-015E9491AD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11:*:*:*:*:*",
"matchCriteriaId": "4F830353-C4E4-4DAF-B7ED-1B0BAE9F3253"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "131C4C00-3811-42BF-A84A-EB2E5DA156B4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A8586AD-E820-4BAE-AAF9-AC7EF2316C06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "802E3D2B-90B7-4725-854F-4174116BC314"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7501697A-BCFD-4DC3-8D87-CC9A186D9589"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0D6C4455-85F4-462D-9FF6-F830ED7D398E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B600BF4C-8169-4086-BFE6-F066BE5F5406"
}
]
}
]
}
],
"references": [
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:161",
"source": "cret@cert.org"
},
{
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:178",
"source": "cret@cert.org"
},
{
"url": "http://www.securityfocus.com/bid/35812",
"source": "cret@cert.org"
},
{
"url": "http://www.securitytracker.com/id?1022607",
"source": "cret@cert.org"
},
{
"url": "http://www.squid-cache.org/Advisories/SQUID-2009_2.txt",
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/b9661.patch",
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/2013",
"source": "cret@cert.org"
}
]
}