Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings.
References
Link | Resource |
---|---|
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 | Patch |
http://fedoranews.org/updates/FEDORA--.shtml | |
http://marc.info/?l=bugtraq&m=110901183320453&w=2 | |
http://www.debian.org/security/2005/dsa-667 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/260421 | Patch Third Party Advisory US Government Resource |
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-empty_acls | Patch |
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-empty_acls.patch | Patch |
http://www.squid-cache.org/bugs/show_bug.cgi?id=1166 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-02-06T05:00:00
Updated: 2016-10-17T13:57:01
Reserved: 2005-01-31T00:00:00
Link: CVE-2005-0194
JSON object: View
NVD Information
Status : Modified
Published: 2005-05-02T04:00:00.000
Modified: 2016-10-18T03:08:26.550
Link: CVE-2005-0194
JSON object: View
Redhat Information
No data.
CWE