Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squid | Squid | 2.5.6 (including) | 2.5.6 (including) |
Squid | Squid | 2.5.stable1 (including) | 2.5.stable1 (including) |
Squid | Squid | 2.5.stable2 (including) | 2.5.stable2 (including) |
Squid | Squid | 2.5.stable3 (including) | 2.5.stable3 (including) |
Squid | Squid | 2.5.stable4 (including) | 2.5.stable4 (including) |
Squid | Squid | 2.5.stable5 (including) | 2.5.stable5 (including) |
Squid | Squid | 2.5.stable6 (including) | 2.5.stable6 (including) |
Squid | Squid | 2.5.stable7 (including) | 2.5.stable7 (including) |
Squid | Squid | 2.5_.stable1 (including) | 2.5_.stable1 (including) |
Squid | Squid | 2.5_.stable3 (including) | 2.5_.stable3 (including) |
Squid | Squid | 2.5_.stable4 (including) | 2.5_.stable4 (including) |
Squid | Squid | 2.5_.stable5 (including) | 2.5_.stable5 (including) |
Squid | Squid | 2.5_.stable6 (including) | 2.5_.stable6 (including) |
Squid | Squid | 2.5_stable3 (including) | 2.5_stable3 (including) |
Squid | Squid | 2.5_stable4 (including) | 2.5_stable4 (including) |
Squid | Squid | 2.5_stable9 (including) | 2.5_stable9 (including) |
Squid | Ubuntu | dapper | * |
Squid | Ubuntu | devel | * |
Squid | Ubuntu | edgy | * |
Squid | Ubuntu | feisty | * |
Red Hat Enterprise Linux 3 | RedHat | squid-7:2.5.STABLE3-6.3E.7 | * |
Red Hat Enterprise Linux 4 | RedHat | squid-7:2.5.STABLE6-3.4E.3 | * |