Vulnerability Details : CVE-2009-2855
The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2009-2855
- cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-2855
96.56%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-2855
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-2855
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2009-2855
-
Red Hat 2010-03-31This issue did not affect the versions of the squid packages, as shipped with Red Hat Enterprise Linux 3 and 4. The issue was addressed in the squid packages as shipped with Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0221.html
References for CVE-2009-2855
-
http://www.securityfocus.com/bid/36091
-
http://www.openwall.com/lists/oss-security/2009/07/20/10
oss-security - squid DoS in external auth header parser
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/52610
Squid strListGetItem() denial of service CVE-2009-2855 Vulnerability Report
-
http://www.squid-cache.org/bugs/show_bug.cgi?id=2541
404 Not Found
-
http://www.securitytracker.com/id?1022757
Access Denied
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534982
#534982 - squid - DoS in external auth header parser - Debian Bug report logs
-
http://www.squid-cache.org/bugs/show_bug.cgi?id=2704
404 Not FoundVendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10592
404 Not Found
-
http://www.openwall.com/lists/oss-security/2009/08/04/6
oss-security - Re: squid DoS in external auth header parser
-
http://www.openwall.com/lists/oss-security/2009/08/03/3
oss-security - Re: squid DoS in external auth header parser
-
https://bugzilla.redhat.com/show_bug.cgi?id=518182
518182 – (CVE-2009-2855) CVE-2009-2855 squid: DoS (100% CPU use) while processing certain external ACL helper HTTP headers
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31;filename=diff;att=1;bug=534982
Jump to