Lucene search

K
freebsdFreeBSD4E4BD2C2-6BD5-11D9-9E1E-C296AC722CB3
HistoryMar 01, 2004 - 12:00 a.m.

squid -- HTTP response splitting cache pollution attack

2004-03-0100:00:00
vuxml.freebsd.org
13

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.047 Low

EPSS

Percentile

92.5%

According to a whitepaper published by Sanctum, Inc., it
is possible to mount cache poisoning attacks against, among others,
squid proxies by inserting false replies into the HTTP stream.
The squid patches page notes:

This patch additionally strengthens Squid from the HTTP response
attack described by Sanctum.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsquid< 2.5.7_8UNKNOWN

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.047 Low

EPSS

Percentile

92.5%