cve-2011-4096
Vulnerability from cvelistv5
Published
2011-11-17 19:00
Modified
2024-08-06 23:53
Severity ?
Summary
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:53:32.679Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12"
          },
          {
            "name": "RHSA-2011:1791",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1791.html"
          },
          {
            "name": "SUSE-SU-2016:1996",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
          },
          {
            "name": "[oss-security] 20111031 CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/10/31/5"
          },
          {
            "name": "1026265",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026265"
          },
          {
            "name": "[oss-security] 20111031 Re: CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/11/01/3"
          },
          {
            "name": "MDVSA-2011:193",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:193"
          },
          {
            "name": "46609",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/46609"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html"
          },
          {
            "name": "SUSE-SU-2016:2089",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
          },
          {
            "name": "47459",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47459"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-10-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12"
        },
        {
          "name": "RHSA-2011:1791",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1791.html"
        },
        {
          "name": "SUSE-SU-2016:1996",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
        },
        {
          "name": "[oss-security] 20111031 CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/10/31/5"
        },
        {
          "name": "1026265",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026265"
        },
        {
          "name": "[oss-security] 20111031 Re: CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/11/01/3"
        },
        {
          "name": "MDVSA-2011:193",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:193"
        },
        {
          "name": "46609",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/46609"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html"
        },
        {
          "name": "SUSE-SU-2016:2089",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
        },
        {
          "name": "47459",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47459"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4096",
    "datePublished": "2011-11-17T19:00:00",
    "dateReserved": "2011-10-18T00:00:00",
    "dateUpdated": "2024-08-06T23:53:32.679Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-4096\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-11-17T19:55:01.453\",\"lastModified\":\"2016-11-28T19:07:41.977\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n idnsGrokReply en Squid anterior a v3.1.16 no adecuada de memoria libre, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (daemon abortar) a trav\u00e9s de una respuesta DNS que contiene un registro CNAME que hace referencia a otro registro CNAME y este contiene un registro vac\u00edo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.1.15\",\"matchCriteriaId\":\"890BD4A7-0680-4BEF-ABA3-FE02FBB05B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B9F669-6217-498A-902E-22EDEEFC565E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre1:*:*:*:*:*\",\"matchCriteriaId\":\"CF9C0078-D06B-4174-AF2C-599638E5B29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre2:*:*:*:*:*\",\"matchCriteriaId\":\"F1DD47BA-EA59-4DCC-BFF3-2DF0BC332CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre3:*:*:*:*:*\",\"matchCriteriaId\":\"2BC1746D-BE02-4D04-B31D-95589EBD4C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre4:*:*:*:*:*\",\"matchCriteriaId\":\"62C35710-215C-4B80-9304-665451F3C0AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre5:*:*:*:*:*\",\"matchCriteriaId\":\"76A7416C-64B2-4F52-93FD-9C504B7D4F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre6:*:*:*:*:*\",\"matchCriteriaId\":\"17D51261-2071-4E8F-AD75-2ECCBE7F7C04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:pre7:*:*:*:*:*\",\"matchCriteriaId\":\"ACD9E084-007E-4C6A-8D30-2DC9B355D7B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable1:*:*:*:*:*\",\"matchCriteriaId\":\"95912E0D-FACF-459B-94FB-334FDBCC292B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable10:*:*:*:*:*\",\"matchCriteriaId\":\"2C455506-7FBF-4F0E-92E7-F074B74C10D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable11:*:*:*:*:*\",\"matchCriteriaId\":\"67288E3E-88BF-44CE-84EF-1BF98E8C38CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable12:*:*:*:*:*\",\"matchCriteriaId\":\"B428BDA9-8C83-4DE3-9391-17AFD5D750BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable13:*:*:*:*:*\",\"matchCriteriaId\":\"DC57EAB8-BFEF-4FE2-8ADB-D196EAE3E51D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable14:*:*:*:*:*\",\"matchCriteriaId\":\"935F2BDE-7F76-4E13-8318-37CE97B7948F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable15:*:*:*:*:*\",\"matchCriteriaId\":\"354599A2-5FCF-4F5A-85AE-00505D32B9BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable2:*:*:*:*:*\",\"matchCriteriaId\":\"1F1BC7B9-9CD1-42E9-84BB-BEE3668BAAA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable3:*:*:*:*:*\",\"matchCriteriaId\":\"88E3716B-863A-40D4-A7D9-F2A288B87394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable4:*:*:*:*:*\",\"matchCriteriaId\":\"02FB3C5B-95F1-4839-8F68-649AFA2FEB1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable5:*:*:*:*:*\",\"matchCriteriaId\":\"631CBA69-B2A1-4522-A330-6A87CCBC682C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable6:*:*:*:*:*\",\"matchCriteriaId\":\"0FE7885D-D1EB-4543-B342-80BC645EE8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable7:*:*:*:*:*\",\"matchCriteriaId\":\"B7C4AE0E-9608-4D24-8EA3-0F33A5D95A5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable8:*:*:*:*:*\",\"matchCriteriaId\":\"628344A8-42AE-4AD7-89A2-66711490AB30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:*:stable9:*:*:*:*:*\",\"matchCriteriaId\":\"3260A290-9F63-4E5C-BEF2-015E9491AD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11:*:*:*:*:*\",\"matchCriteriaId\":\"4F830353-C4E4-4DAF-B7ED-1B0BAE9F3253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"131C4C00-3811-42BF-A84A-EB2E5DA156B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"047EDDD6-02F5-4B53-8FCA-781962392080\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01AD43AB-40BF-449F-A121-A8587E7AE449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3942285D-E20C-45C5-9EF8-821F6D782CB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3FDB45B-4D91-4427-9565-812919086E7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C3C8B5-C2A3-4454-9F89-38A860278366\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B37B7B4-2EAC-4C2A-9526-5C62CBA1DB8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"056EDEEE-A09C-47A2-9217-72E4B8387E00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2593CB12-03E2-4F98-9B89-C09D5EADE077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A44B7A4F-3070-4092-B9AF-3A1CD0897CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF79D9A9-9C11-4E6D-81D1-32CA8CA95223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"042FE60B-7239-45C7-8EE3-A036AC7778F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF5EE89A-720F-456A-BD26-FE46BBA29D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF61A74-9CF9-413E-B997-4FAE5BA28939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5605B00F-438B-45CC-A55D-E75E57BC4684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8316B22E-B016-4F0E-9A3F-383E9B1A85A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A2C5CB-E2F1-4A72-9EA3-912050AFEF7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"574C7DCC-B6E5-42A0-AA44-A0BCD67D1884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0DAD04-02C4-4FC4-BE08-3CAA3B85EB0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2B1F1A5-B435-4A5C-86DF-EC3F29D94417\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113EF7A6-3B8D-4A50-8873-FD36FCBF284C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC97E2DA-7378-486B-9178-3B38FF58589B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F178890-2F7E-43F5-8D6D-5EFCD790E758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA231EB-0F06-4D13-B50D-76FC8393187A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31AB1D33-65EE-46DF-9D29-6B2BFACE7EC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDA4744F-5FB2-4DF8-A7B9-A33EAB004CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72023FB9-F081-4F0A-9E81-2AF0470EB278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.0.stable25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7D973B-9D57-4F74-89B1-A18CDA388EF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8586AD-E820-4BAE-AAF9-AC7EF2316C06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"802E3D2B-90B7-4725-854F-4174116BC314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7501697A-BCFD-4DC3-8D87-CC9A186D9589\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D6C4455-85F4-462D-9FF6-F830ED7D398E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B600BF4C-8169-4086-BFE6-F066BE5F5406\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46272D1B-1468-48C0-B37A-7D06FAC39C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA782B4B-486F-4197-BD5D-ABF791D57211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"558D8641-E097-4D91-9B6E-07433844BB82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B46F5F1-38FC-4E25-8F04-CA2730561DF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69B0A4D-9619-4BEA-A846-C4438C2660F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED17FE35-6B2C-41BF-A7C7-2EECBDB5A934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A50750-3A31-482C-B95C-019C8934850E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF6AC30-9570-4D4B-835E-CCADEB546F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FB84E4E-6A0A-41C8-9DDF-3C18F526F155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E49E5C3-D01F-4DBC-B33A-5495D3EC44F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C53B22-9F33-43E7-8D1F-EEB0DEF4B503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B60DB2-F50C-42F0-B6C9-B25C34B8F578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE973F9E-8387-464F-AFA0-25215B340173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D3F0E3-0C50-4A86-87F4-90FC82B312F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE26BEC0-B9C7-43F0-B0FB-E81870170B29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0778579-A193-4C61-BB1A-6D2E733F3958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED5DC63-6E9D-4068-95DF-AF8FD9A0A7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DE890F9-12C0-4D66-B6C1-6A5A87FAD5F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB414FE3-3567-474B-B5A7-D3EF5DD63AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF450F17-12A2-4E33-875A-5F3C2CA4A5C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AB229E-2C32-410B-BFE2-62DCA734C3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78A6D6B0-9BC0-418E-84EE-23697A0FEC19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF7AFE1-A45A-43B7-B3C7-45C060D046BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41914354-D5BE-4B1F-BED3-0ECA43586537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE9A3716-8670-4847-A6EB-F601184D369E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0E88EE3-EC00-4F1F-BAEF-4F1F893C5C5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A330DFA8-BF79-45CC-BF88-6CEA26D7BC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"679A55F8-34B4-435A-8BCE-8F842F3FB269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"898674F9-6BF7-469F-A74E-558EAFC2CD27\"}]}]}],\"references\":[{\"url\":\"http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/46609\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/47459\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:193\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/10/31/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/11/01/3\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-1791.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1026265\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html\",\"source\":\"secalert@redhat.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.