Squid 2.5, when processing the configuration file, parses empty Access Control Lists (ACLs), including proxy_auth ACLs without defined auth schemes, in a way that effectively removes arguments, which could allow remote attackers to bypass intended ACLs if the administrator ignores the parser warnings.
References
Link | Resource |
---|---|
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-empty_acls.patch | Patch |
http://www.squid-cache.org/bugs/show_bug.cgi?id=1166 | Vendor Advisory |
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-empty_acls | Patch |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000923 | Patch |
http://www.debian.org/security/2005/dsa-667 | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/260421 | Patch Third Party Advisory US Government Resource |
http://fedoranews.org/updates/FEDORA--.shtml | |
http://marc.info/?l=bugtraq&m=110901183320453&w=2 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-05-01 21:00
Updated : 2016-10-17 20:08
NVD link : CVE-2005-0194
Mitre link : CVE-2005-0194
JSON object : View
CWE
Products Affected
squid
- squid