How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200502-04
(Squid: Multiple vulnerabilities)
Squid contains several vulnerabilities:
Buffer overflow when handling WCCP recvfrom()
Loose checking of HTTP headers (CAN-2005-0173 and
Incorrect handling of LDAP login names with spaces
An attacker could exploit:
the WCCP buffer overflow to cause Denial of Service.
the HTTP header parsing vulnerabilities to inject arbitrary
response data, potentially leading to content spoofing, web cache
poisoning and other cross-site scripting or HTTP response splitting
the LDAP issue to login with several variations of the same login
name, leading to log poisoning.
There is no known workaround at this time.
See also :
All Squid users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-proxy/squid-2.5.7-r5'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 16441 (gentoo_GLSA-200502-04.nasl)
CVE ID: CVE-2005-0173CVE-2005-0174CVE-2005-0175CVE-2005-0211
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.