Summary: | www-proxy/squid: buffer overflow can possible cause DoS | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthias Geerdsen (RETIRED) <vorlon> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | normal | ||
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | All | ||
URL: | http://www.squid-cache.org/bugs/show_bug.cgi?id=972 | ||
Whiteboard: | ? | ||
Package list: | Runtime testing required: | --- |
Description
Matthias Geerdsen (RETIRED)
![]() also SA12508: http://secunia.com/advisories/12508/ "A patch has been applied to version 2.5.STABLE5 and 2.5.STABLE6. However, it may reportedly only address the issue partially." Still no confirmation upstream. The claim that Squid 2.5STABLE6 was still vulnerable is false. "d3thStaR" (the person who claimed this), responded below: ------- Additional Comment #15 From d3thStaR 2004-09-27 20:30 ------- I am very sorry... I didn't even realize that people were still looking for an answer with this... I'm fairly embarrassed with all of this, but the release I thought was STABLE6 was a mis-labled version of Stable5... I appologize for the inconvinience.. |