CVE-2009-2622
Published Jul 28, 2009
Last updated 15 years ago
Overview
- Description
- Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) "missing or mismatched protocol identifier," (2) missing or negative status value," (3) "missing version," or (4) "missing or invalid status number," related to (a) HttpMsg.cc and (b) HttpReply.cc.
- Source
- cret@cert.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Vendor comments
- Red HatNot vulnerable. This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 3, 4, or 5.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre1:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF9C0078-D06B-4174-AF2C-599638E5B29D" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre2:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1DD47BA-EA59-4DCC-BFF3-2DF0BC332CBB" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BC1746D-BE02-4D04-B31D-95589EBD4C93" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre4:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62C35710-215C-4B80-9304-665451F3C0AB" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre5:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76A7416C-64B2-4F52-93FD-9C504B7D4F40" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre6:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17D51261-2071-4E8F-AD75-2ECCBE7F7C04" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:pre7:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACD9E084-007E-4C6A-8D30-2DC9B355D7B5" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable1:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95912E0D-FACF-459B-94FB-334FDBCC292B" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable10:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C455506-7FBF-4F0E-92E7-F074B74C10D7" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable11:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67288E3E-88BF-44CE-84EF-1BF98E8C38CA" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable12:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B428BDA9-8C83-4DE3-9391-17AFD5D750BB" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable13:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC57EAB8-BFEF-4FE2-8ADB-D196EAE3E51D" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable14:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "935F2BDE-7F76-4E13-8318-37CE97B7948F" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable15:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "354599A2-5FCF-4F5A-85AE-00505D32B9BF" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable2:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F1BC7B9-9CD1-42E9-84BB-BEE3668BAAA6" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88E3716B-863A-40D4-A7D9-F2A288B87394" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable4:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02FB3C5B-95F1-4839-8F68-649AFA2FEB1C" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable5:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "631CBA69-B2A1-4522-A330-6A87CCBC682C" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable6:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FE7885D-D1EB-4543-B342-80BC645EE8EC" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable7:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7C4AE0E-9608-4D24-8EA3-0F33A5D95A5E" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable8:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "628344A8-42AE-4AD7-89A2-66711490AB30" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:*:stable9:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3260A290-9F63-4E5C-BEF2-015E9491AD18" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F830353-C4E4-4DAF-B7ED-1B0BAE9F3253" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.0:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "131C4C00-3811-42BF-A84A-EB2E5DA156B4" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A8586AD-E820-4BAE-AAF9-AC7EF2316C06" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "802E3D2B-90B7-4725-854F-4174116BC314" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7501697A-BCFD-4DC3-8D87-CC9A186D9589" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6C4455-85F4-462D-9FF6-F830ED7D398E" }, { "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B600BF4C-8169-4086-BFE6-F066BE5F5406" } ], "operator": "OR" } ] } ]