Vulnerability Name:

CVE-2004-2654 (CCN-17321)

Assigned:2004-09-11
Published:2004-09-11
Updated:2008-09-05
Summary:The clientAbortBody function in client_side.c in Squid Web Proxy Cache before 2.6 STABLE6 allows remote attackers to cause a denial of service (segmentation fault) via unspecified vectors that trigger a null dereference.
Note: in a followup advisory, a researcher claimed that the issue was a buffer overflow that was not fixed in STABLE6. However, the vendor's bug report clearly shows that the researcher later retracted this claim, because the tested product was actually STABLE5.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2004-2654

Source: CCN
Type: RHSA-2004-462
squid security update

Source: CCN
Type: SA12508
Squid "clientAbortBody()" and PUT/POST Denial of Service Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
12508

Source: SECUNIA
Type: Patch, Vendor Advisory
12754

Source: CCN
Type: SECTRACK ID: 1011214
Squid Null Pointer Dereference in clientAbortBody() Lets Remote Users Crash the Proxy

Source: SECTRACK
Type: UNKNOWN
1011214

Source: VIM
Type: UNKNOWN
20060223 old Squid clientAbortBody issue - NOT an overflow?

Source: CCN
Type: GLSA-200409-04
Squid: Denial of service when using NTLM authentication

Source: OSVDB
Type: UNKNOWN
9801

Source: CCN
Type: OSVDB ID: 9801
Squid Proxy clientAbortBody() Null Dereference DoS

Source: CCN
Type: BID-11098
Squid Proxy NTLM Authentication Denial Of Service Vulnerability

Source: MISC
Type: UNKNOWN
http://www.securitylab.ru/47881.html

Source: CCN
Type: Squid Web Proxy Cache Web site
Squid Web Proxy Cache

Source: MISC
Type: UNKNOWN
http://www.squid-cache.org/bugs/show_bug.cgi?id=972

Source: CCN
Type: Trustix Secure Linux Security Advisory #2004-0047
Several security holes

Source: CCN
Type: TLSA-2004-29
DoS vulnerability in squid

Source: CCN
Type: USN-19-1
squid vulnerabilities

Source: XF
Type: UNKNOWN
squid-clientabortbody-dos(17321)

Source: SUSE
Type: SUSE-SA:2004:032
apache2: remote denial-of-service

Source: SUSE
Type: SUSE-SA:2004:033
gtk2 gdk-pixbuf: remote code execution

Source: SUSE
Type: SUSE-SA:2004:034
XFree86-libs xshared: remote command execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:squid:squid:2.5_stable5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:squid-cache:squid:2.5.stable5:*:*:*:*:*:*:*
  • OR cpe:/a:squid-cache:squid:2.5.stable4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    squid squid 2.5_stable5
    squid-cache squid 2.5.stable5
    squid-cache squid 2.5.stable4
    gentoo linux *
    suse suse linux 8.1
    suse linux enterprise server 8
    suse suse linux 8.2
    trustix secure linux 2.0
    suse suse linux 9.0
    mandrakesoft mandrake linux 9.2
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    trustix secure linux 2.1
    mandrakesoft mandrake linux 10.0
    suse suse linux 9.1
    redhat enterprise linux 3
    suse linux enterprise server 9
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0