diff options
author | pav <pav@FreeBSD.org> | 2005-05-19 22:17:01 +0800 |
---|---|---|
committer | pav <pav@FreeBSD.org> | 2005-05-19 22:17:01 +0800 |
commit | 027912e8bc4cdaa66e7553041965fb445dcb788f (patch) | |
tree | 31ee63cd762befb36a233e5d70b3141dd0f6ca8c /security/vuxml | |
parent | 28372072e87acd57a9914ee2352ffc13240ec5ce (diff) | |
download | freebsd-ports-gnome-027912e8bc4cdaa66e7553041965fb445dcb788f.tar.gz freebsd-ports-gnome-027912e8bc4cdaa66e7553041965fb445dcb788f.tar.zst freebsd-ports-gnome-027912e8bc4cdaa66e7553041965fb445dcb788f.zip |
- Update Squid to 2.5.STABLE10
PR: ports/81213
Submitted by: Thomas-Martin Seck <tmseck@netcologne.de> (maintainer)
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 58 |
1 files changed, 58 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 2747c9b60cd3..43054e79de73 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -16327,4 +16327,62 @@ misc.c: </dates> </vuln> + <vuln vid="a395397c-c7c8-11d9-9e1e-c296ac722cb3"> + <topic>squid -- possible abuse of cachemgr.cgi</topic> + <affects> + <package> + <name>squid</name> + <range><lt>2.5.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The squid patches page notes:</p> + <blockquote cite="http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-cachemgr_conf"> + <p>This patch adds access controls to the cachemgr.cgi script, + preventing it from being abused to reach other servers than + allowed in a local configuration file.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-1999-0710</cvename> + <url>http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-cachemgr_conf</url> + <url>http://www.squid-cache.org/bugs/show_bug.cgi?id=1094</url> + </references> + <dates> + <discovery>19990729</discovery> + <entry>20050519</entry> + </dates> + </vuln> + + <vuln vid="7e97b288-c7ca-11d9-9e1e-c296ac722cb3"> + <topic>squid -- DNS lookup spoofing vulnerability</topic> + <affects> + <package> + <name>squid</name> + <range><lt>2.5.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The squid patches page notes:</p> + <blockquote cite="http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query"> + <p>Malicious users may spoof DNS lookups if the DNS client UDP port + (random, assigned by OS as startup) is unfiltered and your network + is not protected from IP spoofing.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CAN-2005-1519</cvename> + <url>http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_reply</url> + <url>http://secunia.com/advisories/15294</url> + </references> + <dates> + <discovery>20050511</discovery> + <entry>20050519</entry> + </dates> + </vuln> + </vuxml> |