7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
7.6 High
AI Score
Confidence
Low
0.202 Low
EPSS
Percentile
96.4%
Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter.
fedoranews.org/updates/FEDORA--.shtml
marc.info/?l=bugtraq&m=110780531820947&w=2
secunia.com/advisories/14076
securitytracker.com/id?1013045
www.debian.org/security/2005/dsa-667
www.kb.cert.org/vuls/id/886006
www.mandriva.com/security/advisories?name=MDKSA-2005:034
www.novell.com/linux/security/advisories/2005_06_squid.html
www.osvdb.org/13319
www.redhat.com/support/errata/RHSA-2005-060.html
www.redhat.com/support/errata/RHSA-2005-061.html
www.securityfocus.com/bid/12432
www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow
www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-wccp_buffer_overflow.patch
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9573