Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1843-2 | New squid3 packages fix regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |

Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-07T05:59:55.743Z
Reserved: 2009-07-28T00:00:00
Link: CVE-2009-2621

No data.

Status : Deferred
Published: 2009-07-28T17:30:01.077
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-2621


No data.