CVE-2009-2621
Publication date 28 July 2009
Last updated 24 July 2024
Ubuntu priority
Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce “buffer limits and related bound checks,” which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.
Status
Package | Ubuntu Release | Status |
---|---|---|
squid3 | 11.10 oneiric |
Not affected
|
11.04 natty |
Not affected
|
|
10.10 maverick |
Not affected
|
|
10.04 LTS lucid |
Not affected
|
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Fixed 3.0.STABLE8-3+lenny2build0.9.04.1
|
|
8.10 intrepid | Ignored end of life, was needed | |
8.04 LTS hardy | Ignored end of life | |
6.06 LTS dapper | Not in release |