7.7 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.446 Medium
EPSS
Percentile
97.4%
Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header. NOTE: some of these details are obtained from third party information.
CPE | Name | Operator | Version |
---|---|---|---|
sarg:squid_analysis_report_generator | sarg squid analysis report generator | eq | 2.2.3.1 |
lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
secunia.com/advisories/28668
secunia.com/advisories/29309
secunia.com/advisories/29323
secunia.com/advisories/29500
sourceforge.net/project/shownotes.php?release_id=581212
www.gentoo.org/security/en/glsa/glsa-200803-21.xml
www.mandriva.com/security/advisories?name=MDVSA-2008:079
www.securityfocus.com/archive/1/489018/100/0/threaded
www.securityfocus.com/bid/28077
www.securitytracker.com/id?1019536
www.vupen.com/english/advisories/2008/0749
exchange.xforce.ibmcloud.com/vulnerabilities/40970