ghsa-xv7f-73w8-27qj
Vulnerability from github
Published
2022-05-17 03:46
Modified
2022-05-17 03:46
Details
Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression.
{ "affected": [], "aliases": [ "CVE-2011-3205" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-09-06T15:55:00Z", "severity": "MODERATE" }, "details": "Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression.", "id": "GHSA-xv7f-73w8-27qj", "modified": "2022-05-17T03:46:34Z", "published": "2022-05-17T03:46:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3205" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734583" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2011/08/29/2" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2011/08/30/4" }, { "type": "WEB", "url": "http://openwall.com/lists/oss-security/2011/08/30/8" }, { "type": "WEB", "url": "http://secunia.com/advisories/45805" }, { "type": "WEB", "url": "http://secunia.com/advisories/45906" }, { "type": "WEB", "url": "http://secunia.com/advisories/45920" }, { "type": "WEB", "url": "http://secunia.com/advisories/45965" }, { "type": "WEB", "url": "http://secunia.com/advisories/46029" }, { "type": "WEB", "url": "http://securitytracker.com/id?1025981" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2304" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:150" }, { "type": "WEB", "url": "http://www.osvdb.org/74847" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-1293.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/49356" }, { "type": "WEB", "url": "http://www.squid-cache.org/Advisories/SQUID-2011_3.txt" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch" }, { "type": "WEB", "url": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch" } ], "schema_version": "1.4.0", "severity": [] }
Loading...