Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> Squid null character unauthorized access


Vulnerability Assessment Details

Squid null character unauthorized access

Vulnerability Assessment Summary
Acertains squid version

Detailed Explanation for this Vulnerability Assessment

The remote squid caching proxy, according to its version number,
is vulnerable to a flaw which may permit a possible hacker to gain access
to unauthorized resources.

The flaw in itself consists of sending a malformed username containing
the %00 (null) character, which may permit a possible hacker to access otherwise
restricted resources.

Solution : Upgrade to squid 2.5.STABLE6 or newer
Network Security Threat Level: High

Networks Security ID: 9778

Vulnerability Assessment Copyright: This script is Copyright (C) 2004-2006 Tenable Network Security

Cables, Connectors

1975+ Best of BYTE Magazine 1st 6 Issues Altair 8800 IMSAI 8080 KIM-1 SWTPC 6800
$36.0
1975+ Best of BYTE Magazine 1st 6 Issues Altair 8800 IMSAI 8080 KIM-1 SWTPC 6800 picture1979 Computer Guide PET Altair 8800 Ohio Scientific SOL-20 VECTOR 1 Bally Arcade
$29.0
1979 Computer Guide PET Altair 8800 Ohio Scientific SOL-20 VECTOR 1 Bally Arcade pictureAltair 8800, VERY EARLY
$5000.0
Altair 8800, VERY EARLY pictureMITS Altair 8800 COMPUTER DOS MONITOR II ASSEMBLER DEBUG 1977 Software MANUAL
$109.0
MITS Altair 8800 COMPUTER  DOS MONITOR II ASSEMBLER DEBUG 1977 Software MANUAL picture


Discussions

No Discussions have been posted on this vulnerability.