A bug exists in the code that parses responses from Gopher servers. The bug results in a buffer overflow if a Gopher server returns a line longer than 4096 bytes. The overflow results in memory corruption and usually crashes Squid. CAN-2005-0094 A bug exists in the code that parses WCCP messages. An attacker that sends a malformed WCCP messages, with a spoofed source address matching Squid's "home router" can crash Squid. CAN-2005-0095
13 lines
1009 B
Plaintext
13 lines
1009 B
Plaintext
MD5 (squid/squid-2.5.STABLE7-gopher_html_parsing.patch) = 1c0ba661b91a17fbd01e5e42430deb86
|
|
MD5 (squid/squid-2.5.STABLE7-wccp_denial_of_service.patch) = 0c77d92efda39797eb7d59c8d2e942d0
|
|
MD5 (squid/squid-2.5.STABLE7.tar.gz) = dbdc8ef226e744d63b03f3bbe24b42da
|
|
RMD160 (squid/squid-2.5.STABLE7-gopher_html_parsing.patch) = 56f7b4108151d54395eb5a2472276d1d1bab8e9e
|
|
RMD160 (squid/squid-2.5.STABLE7-wccp_denial_of_service.patch) = fe280dec5037bea75e35ccd43ede4a4091a3ffcb
|
|
RMD160 (squid/squid-2.5.STABLE7.tar.gz) = e23e8f8b4c085f922d80eeea73665fd7470a907a
|
|
SHA1 (squid/squid-2.5.STABLE7-gopher_html_parsing.patch) = 5da5a8b3b24eded8552d09b45f329ee927c66b3e
|
|
SHA1 (squid/squid-2.5.STABLE7-wccp_denial_of_service.patch) = e4bec66adbe369eaa91cd6db3a503eb0a6de40e1
|
|
SHA1 (squid/squid-2.5.STABLE7.tar.gz) = 9fa0ed822f626f570ea3aa4fcc3e423ca2e1fe57
|
|
SIZE (squid/squid-2.5.STABLE7-gopher_html_parsing.patch) = 714
|
|
SIZE (squid/squid-2.5.STABLE7-wccp_denial_of_service.patch) = 1928
|
|
SIZE (squid/squid-2.5.STABLE7.tar.gz) = 1362398
|