Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:12.squid.asc
archives.neohapsis.com/archives/linux/caldera/2002-q1/0014.html
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000464
marc.info/?l=bugtraq&m=101431040422095&w=2
marc.info/?l=bugtraq&m=101440163111826&w=2
marc.info/?l=bugtraq&m=101443252627021&w=2
www.caldera.com/support/security/advisories/CSSA-2002-010.0.txt
www.iss.net/security_center/static/8258.php
www.linux-mandrake.com/en/security/2002/MDKSA-2002-016.php
www.novell.com/linux/security/advisories/2002_008_squid_txt.html
www.osvdb.org/5378
www.redhat.com/support/errata/RHSA-2002-029.html
www.securityfocus.com/bid/4148
www.squid-cache.org/Versions/v2/2.4/bugs/