FreeBSD : squid -- HTTP response splitting cache pollution attack (4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3)

Medium Nessus Plugin ID 18930


The remote FreeBSD host is missing a security-related update.


According to a whitepaper published by Sanctum, Inc., it is possible to mount cache poisoning attacks against, among others, squid proxies by inserting false replies into the HTTP stream.

The squid patches page notes :

This patch additionally strengthens Squid from the HTTP response attack described by Sanctum.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 18930

File Name: freebsd_pkg_4e4bd2c26bd511d99e1ec296ac722cb3.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2005/07/13

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:squid, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2005/01/22

Vulnerability Publication Date: 2004/03/01

Reference Information

CVE: CVE-2005-0175

CERT: 625878