Vulnerability Name: CVE-2005-0211 (CCN-19142) Assigned: 2005-01-28 Published: 2005-01-28 Updated: 2018-10-12 Summary: Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long WCCP packet, which is processed by a recvfrom function call that uses an incorrect length parameter. CVSS v3 Severity: 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P )5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-119 Vulnerability Consequences: Denial of Service References: Source: CCN Type: SGI Security Advisory 20050207-01-USGI Advanced Linux Environment 3 Security Update #27 Source: MITRE Type: CNACVE-2005-0211 Source: FEDORA Type: Broken LinkFLSA-2006:152809 Source: BUGTRAQ Type: Third Party Advisory20050207 [USN-77-1] Squid vulnerabilities Source: CCN Type: RHSA-2005-060squid security update Source: CCN Type: RHSA-2005-061squid security update Source: CCN Type: SA14076Squid WCCP Message Handling Buffer Overflow Vulnerability Source: SECUNIA Type: Permissions Required14076 Source: CCN Type: SECTRACK ID: 1013045Squid Buffer Overflow in WCCP recvfrom() Lets Remote Users Deny Service Source: SECTRACK Type: Third Party Advisory, VDB Entry1013045 Source: CCN Type: CIAC Information Bulletin P-138Updated Squid Package Fixes Security Issues Source: DEBIAN Type: Patch, Third Party AdvisoryDSA-667 Source: DEBIAN Type: DSA-667squid -- several vulnerabilities Source: CCN Type: GLSA-200502-04Squid: Multiple vulnerabilities Source: CCN Type: US-CERT VU#886006Squid vulnerable to buffer overflow via an overly long WCCP message Source: CERT-VN Type: Patch, Third Party Advisory, US Government ResourceVU#886006 Source: MANDRAKE Type: Broken LinkMDKSA-2005:034 Source: SUSE Type: Broken LinkSUSE-SA:2005:006 Source: OSVDB Type: Broken Link13319 Source: CCN Type: OSVDB ID: 13319Squid WCCP recvfrom() Function Overflow Source: REDHAT Type: Not Applicable, Third Party AdvisoryRHSA-2005:060 Source: REDHAT Type: Not Applicable, Third Party AdvisoryRHSA-2005:061 Source: BID Type: Third Party Advisory, VDB Entry12432 Source: CCN Type: BID-12432Squid Proxy WCCP recvfrom() Buffer Overflow Vulnerability Source: CCN Type: Squid Proxy Cache Security Update Advisory SQUID-2005:3Buffer overflow in WCCP recvfrom() call Source: CCN Type: Squid Web Proxy Cache Web siteBuffer overflow in WCCP recvfrom() call Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-wccp_buffer_overflow.patch Source: CCN Type: TLSA-2005-24Multiple vulnerabilities exist in Squid Source: CCN Type: USN-77-1Squid vulnerabilities Source: XF Type: UNKNOWNsquid-wccp-recvfrom-bo(19142) Source: OVAL Type: Third Party Advisoryoval:org.mitre.oval:def:9573 Source: SUSE Type: SUSE-SA:2005:006squid: remote command execution Vulnerable Configuration: Configuration 1 :cpe:/a:squid-cache:squid:2.5.stable1:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable2:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable3:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable4:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable5:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable6:*:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:squid-cache:squid:2.5.stable5:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable4:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable3:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable1:*:*:*:*:*:*:* OR cpe:/a:squid-cache:squid:2.5.stable2:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
squid-cache squid 2.5.stable1
squid-cache squid 2.5.stable2
squid-cache squid 2.5.stable3
squid-cache squid 2.5.stable4
squid-cache squid 2.5.stable5
squid-cache squid 2.5.stable6
debian debian linux 3.0
squid-cache squid 2.5.stable5
squid-cache squid 2.5.stable4
squid-cache squid 2.5.stable3
squid-cache squid 2.5.stable1
squid-cache squid 2.5.stable2
debian debian linux 3.0
gentoo linux *
suse suse linux 8.1
suse linux enterprise server 8
mandrakesoft mandrake linux corporate server 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
suse suse linux 8.2
suse suse linux 9.0
mandrakesoft mandrake linux 9.2
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
mandrakesoft mandrake linux 10.0
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux corporate server 3.0
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1