From b731dce1aa76541e49cede9ac6d99aa1f3eccc80 Mon Sep 17 00:00:00 2001 From: edwin Date: Sat, 22 Jan 2005 09:35:07 +0000 Subject: squid bug #1200: squid -- HTTP response splitting cache pollution attack PR: ports/76550 Submitted by: Thomas-Martin Seck --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3293ccf7e881..0d0d5ff3a2bc 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + squid -- HTTP response splitting cache pollution attack + + + squid + 2.5.7_8 + + + + +

According to a whitepaper published by Sanctum, Inc., it + is possible to mount cache poisoning attacks against, among others, + squid proxies by inserting false replies into the HTTP stream.

+

The squid patches page notes:

+
+

This patch additionally strengthens Squid from the HTTP response + attack described by Sanctum.

+
+ +
+ + http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting + http://www.squid-cache.org/bugs/show_bug.cgi?id=1200 + https://www.watchfire.com/securearea/whitepapers.aspx?id=8 + + + 2004-03-01 + 2004-01-22 + +
+ horde -- XSS vulnerabilities -- cgit