Squid-cache

Squid

104 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 02.09.2020 17:15:11
  • Zuletzt bearbeitet 21.11.2024 05:06:13

An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser s...

  • EPSS 6.34%
  • Veröffentlicht 24.08.2020 18:15:10
  • Zuletzt bearbeitet 21.11.2024 05:15:08

Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digest...

  • EPSS 0.43%
  • Veröffentlicht 30.06.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:27

An issue was discovered in Squid before 4.12 and 5.x before 5.0.3. Due to use of a potentially dangerous function, Squid and the default certificate validation helper are vulnerable to a Denial of Service when opening a TLS connection to an attacker-...

  • EPSS 3.42%
  • Veröffentlicht 30.06.2020 19:15:11
  • Zuletzt bearbeitet 21.11.2024 05:02:27

An issue was discovered in Squid 5.x before 5.0.3. Due to an Incorrect Synchronization, a Denial of Service can occur when processing objects in an SMP cache because of an Ipc::Mem::PageStack::pop ABA problem during access to the memory page/slot man...

  • EPSS 15.65%
  • Veröffentlicht 30.06.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 05:04:41

An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containi...

  • EPSS 28.48%
  • Veröffentlicht 23.04.2020 15:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:57

An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a s...

  • EPSS 7.54%
  • Veröffentlicht 15.04.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7. When handling the tag esi:when when ESI is enabled, Squid calls ESIExpression::Evaluate. This function uses a fixed stack buffer to hold the expression while it's being evaluated. When processing the expr...

  • EPSS 4.82%
  • Veröffentlicht 15.04.2020 20:15:13
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7 and 5. When receiving a request, Squid checks its cache to see if it can serve up a response. It does this by making a MD5 hash of the absolute URL of the request. If found, it servers the request. The abs...

  • EPSS 0.57%
  • Veröffentlicht 15.04.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7. When Squid is parsing ESI, it keeps the ESI elements in ESIContext. ESIContext contains a buffer for holding a stack of ESIElements. When a new ESIElement is parsed, it is added via addStackElement. addSt...

  • EPSS 0.18%
  • Veröffentlicht 15.04.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 04:23:01

An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for...