Squid < 2.5.STABLE8 DoS

Medium Nessus Network Monitor Plugin ID 2520


The remote proxy server is vulnerable to a Denial of Service (DoS) attack.


The remote Squid caching proxy, according to its version number, may be vulnerable to a remote denial of service.

This flaw is caused due to an input validation error in the NTLM module.

An attacker can exploit this flaw to crash the server with a specially crafted packet.

The remote Squid proxy is also vulnerable to a cache-corruption flaw due to incorrect parsing of malformed HTTP headers. An attacker exploiting this flaw would be able to poison the cache.

The remote Squid proxy is vulnerable to an authentication bypass
in the squid_ldap_auth module as well as a remote overflow due to oversized HTTP headers.


Upgrade to Squid 2.5.STABLE8 or higher.

See Also




Plugin Details

Severity: Medium

ID: 2520

File Name: 2520.prm

Family: Web Servers

Published: 2005/01/21

Modified: 2016/11/23

Dependencies: 3389

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 5.1


Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2005/01/08

Vulnerability Publication Date: 2005/01/08

Reference Information

CVE: CVE-2005-0241, CVE-2005-0096, CVE-2005-0173, CVE-2005-0174, CVE-2005-0097, CVE-2005-0175, CVE-2005-0211

BID: 12220, 12324, 12412, 12431, 12432, 12433