fkie_cve-2013-4123
Vulnerability from fkie_nvd
Published
2013-09-16 19:14
Modified
2025-04-11 00:51
Severity ?
Summary
client_side_request.cc in Squid 3.2.x before 3.2.13 and 3.3.x before 3.3.8 allows remote attackers to cause a denial of service via a crafted port number in a HTTP Host header.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "728DD64E-C267-475A-BEA8-C139581DD7A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE8F3F5-45A2-418A-9D8E-4E6DFC888BC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F4845D4-40D9-431E-A63C-E949B9D9F959",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EF070E6-0B73-4F6D-8932-B284697FCD2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E07992B-92B4-4307-8DBD-085376C1D6DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "386550A3-A55B-4F24-9625-6A50260ADA72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "810D1F9E-81E5-45F0-B62B-AB0A797FF8B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4673327A-1E50-47CC-AD83-6A3D2E687292",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6624AF2D-9EF0-4597-B8B2-20D7A309EA6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9F75D13-ED59-42A9-A662-AC77DBA20903",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DFAB3BA-BBE9-4CFB-BE6B-BDF3E7772E7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9F523B8-463E-4FB0-ACB6-E36AAAF85CD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BA593D9-907D-4051-A3F2-0F88F01A7C79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "20D2B364-B98A-4484-A10A-86AF43774096",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B7BF076-0D43-407A-86DC-D1163922A787",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA576F49-A7F5-4013-89DF-F6C91C15B547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D3F52FE-FFB3-4221-8DC7-3F5680A07429",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "604FEF42-ABA7-42C1-8A5F-C3AECFD68481",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC2568C1-89CB-41C1-9126-A8665614D0B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "C18B5392-3FDB-49E6-89DB-7945D337FBFB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA9E0E7F-E93C-4DE9-8D91-5EE50BCFAC2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BFF9D8B-343B-415D-8AF8-B07AF94CC48B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "16F5794B-BBFB-4B12-9A0B-88A0334681C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.14:*:*:*:*:*:*:*",
                     matchCriteriaId: "17D0083E-8D50-4DC6-979F-685D5CB588AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.15:*:*:*:*:*:*:*",
                     matchCriteriaId: "138FAD73-1D25-4F46-B9EA-599FF0EDA1AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.16:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE34DC1-F654-474E-B6A3-D81B9BF4D6CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.17:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A4BF7AC-7D9F-40D8-A5AA-BE1EBF37CF96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.18:*:*:*:*:*:*:*",
                     matchCriteriaId: "643E8B9B-C3F4-4171-BF67-D9359BDCE5CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.0.19:*:*:*:*:*:*:*",
                     matchCriteriaId: "A73CBC60-1EF1-4730-9350-EB51F269695B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2721E403-A553-492F-897F-1CD1E2685139",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "85B091C4-8104-4A1E-A09D-EBCD114DC829",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA2EDF9C-45AD-4980-8DEF-C7F473B22CAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE4B8448-49FA-491C-A6A2-040233D670B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "11480BB1-874C-48EB-BB03-081313310608",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B739890-99E8-434C-97D4-3739E6C31838",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C7B1871-3C85-4B88-AB42-E60BF5CDFB04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A71DCD2-0E54-46A7-8309-CDB0736AD5C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD54BDDF-F7A8-4715-BA0E-4E7F741492FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A2B9699-6622-4883-BA03-E3374C54871A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "78391DAF-2096-4DC4-80E4-D4D2859DCA32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:squid-cache:squid:3.2.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B062A06-31C1-4B23-B7BD-9F751ABD6A37",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "client_side_request.cc in Squid 3.2.x before 3.2.13 and 3.3.x before 3.3.8 allows remote attackers to cause a denial of service via a crafted port number in a HTTP Host header.",
      },
      {
         lang: "es",
         value: "client_side_request.cc en Squid 3.2.x anteriores a 3.2.13 y 3.3.x anteriores a 3.3.8 permite a un atacante remoto causar una denegación de servicio a través de un número de puerto manipulado en una cabecera HTTP Host.",
      },
   ],
   id: "CVE-2013-4123",
   lastModified: "2025-04-11T00:51:21.963",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2013-09-16T19:14:38.397",
   references: [
      {
         source: "secalert@redhat.com",
         url: "http://lists.opensuse.org/opensuse-updates/2013-09/msg00024.html",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54142",
      },
      {
         source: "secalert@redhat.com",
         url: "http://secunia.com/advisories/54834",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.squid-cache.org/Advisories/SQUID-2013_3.txt",
      },
      {
         source: "secalert@redhat.com",
         tags: [
            "Patch",
         ],
         url: "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11826.patch",
      },
      {
         source: "secalert@redhat.com",
         url: "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12591.patch",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-updates/2013-09/msg00024.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/54142",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/54834",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.squid-cache.org/Advisories/SQUID-2013_3.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11826.patch",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12591.patch",
      },
   ],
   sourceIdentifier: "secalert@redhat.com",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-20",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.