Revision Date: | 2013-04-29 | Version: | 11 |
Title: | Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable). |
Description: | Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ("pass" variable). |
Family: | unix | Class: | vulnerability |
Status: | ACCEPTED | Reference(s): | CVE-2004-0541
|
Platform(s): | CentOS Linux 3 Red Hat Enterprise Linux 3
| Product(s): | |
Definition Synopsis |
RHEL3 or CentOS3 The operating system installed on the system is Red Hat Enterprise Linux 3
OR CentOS Linux 3.x
AND squid is earlier than 7:2.5.STABLE3-6.3E
|