FreeBSD : squid -- buffer overflow vulnerability in gopherToHTML (184ab9e0-64cd-11d9-9e1e-c296ac722cb3)

Medium Nessus Plugin ID 18851


The remote FreeBSD host is missing a security-related update.


The squid patches page notes :

A malicious gopher server may return a response with very long lines that cause a buffer overflow in Squid.

Workaround: Since gopher is very obscure these days, do not allow Squid to any gopher servers. Use an ACL rule like : acl Gopher proto gopher http_access deny Gopher


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 18851

File Name: freebsd_pkg_184ab9e064cd11d99e1ec296ac722cb3.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2005/07/13

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:squid, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/01/12

Vulnerability Publication Date: 2005/01/11

Reference Information

CVE: CVE-2005-0094