Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or conduct certain attacks via headers that do not follow the HTTP specification, including (1) multiple Content-Length headers, (2) carriage return (CR) characters that are not part of a CRLF pair, and (3) header names containing whitespace characters.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squid | Squid | 2.5.6 (including) | 2.5.6 (including) |
Squid | Squid | 2.5.stable1 (including) | 2.5.stable1 (including) |
Squid | Squid | 2.5.stable2 (including) | 2.5.stable2 (including) |
Squid | Squid | 2.5.stable3 (including) | 2.5.stable3 (including) |
Squid | Squid | 2.5.stable4 (including) | 2.5.stable4 (including) |
Squid | Squid | 2.5.stable5 (including) | 2.5.stable5 (including) |
Squid | Squid | 2.5.stable6 (including) | 2.5.stable6 (including) |
Squid | Squid | 2.5.stable7 (including) | 2.5.stable7 (including) |
Squid | Squid | 2.5_.stable1 (including) | 2.5_.stable1 (including) |
Squid | Squid | 2.5_.stable3 (including) | 2.5_.stable3 (including) |
Squid | Squid | 2.5_.stable4 (including) | 2.5_.stable4 (including) |
Squid | Squid | 2.5_.stable5 (including) | 2.5_.stable5 (including) |
Squid | Squid | 2.5_.stable6 (including) | 2.5_.stable6 (including) |
Squid | Squid | 2.5_stable3 (including) | 2.5_stable3 (including) |
Squid | Squid | 2.5_stable4 (including) | 2.5_stable4 (including) |
Squid | Squid | 2.5_stable9 (including) | 2.5_stable9 (including) |