fkie_cve-2011-3205
Vulnerability from fkie_nvd
Published
2011-09-06 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response. NOTE: This issue exists because of a CVE-2005-0094 regression.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/08/29/2
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/08/30/4
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/08/30/8
secalert@redhat.comhttp://secunia.com/advisories/45805Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45906
secalert@redhat.comhttp://secunia.com/advisories/45920
secalert@redhat.comhttp://secunia.com/advisories/45965
secalert@redhat.comhttp://secunia.com/advisories/46029
secalert@redhat.comhttp://securitytracker.com/id?1025981
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2304
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:150
secalert@redhat.comhttp://www.osvdb.org/74847
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1293.html
secalert@redhat.comhttp://www.securityfocus.com/bid/49356
secalert@redhat.comhttp://www.squid-cache.org/Advisories/SQUID-2011_3.txt
secalert@redhat.comhttp://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patchPatch
secalert@redhat.comhttp://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patchPatch
secalert@redhat.comhttp://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patchPatch
secalert@redhat.comhttp://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patchPatch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=734583Patch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/08/29/2
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/08/30/4
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/08/30/8
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45805Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45906
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45920
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45965
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/46029
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025981
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2304
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:150
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/74847
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1293.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/49356
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Advisories/SQUID-2011_3.txt
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patchPatch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=734583Patch
Impacted products
Vendor Product Version
squid-cache squid 3.0.stable1
squid-cache squid 3.0.stable2
squid-cache squid 3.0.stable3
squid-cache squid 3.0.stable4
squid-cache squid 3.0.stable5
squid-cache squid 3.0.stable6
squid-cache squid 3.0.stable7
squid-cache squid 3.0.stable8
squid-cache squid 3.0.stable9
squid-cache squid 3.0.stable10
squid-cache squid 3.0.stable11
squid-cache squid 3.0.stable11
squid-cache squid 3.0.stable12
squid-cache squid 3.0.stable13
squid-cache squid 3.0.stable14
squid-cache squid 3.0.stable15
squid-cache squid 3.0.stable16
squid-cache squid 3.0.stable16
squid-cache squid 3.0.stable17
squid-cache squid 3.0.stable18
squid-cache squid 3.0.stable19
squid-cache squid 3.0.stable20
squid-cache squid 3.0.stable21
squid-cache squid 3.0.stable22
squid-cache squid 3.0.stable23
squid-cache squid 3.0.stable24
squid-cache squid 3.0.stable25
squid-cache squid 3.1
squid-cache squid 3.1.0.1
squid-cache squid 3.1.0.2
squid-cache squid 3.1.0.3
squid-cache squid 3.1.0.4
squid-cache squid 3.1.0.5
squid-cache squid 3.1.0.6
squid-cache squid 3.1.0.7
squid-cache squid 3.1.0.8
squid-cache squid 3.1.0.9
squid-cache squid 3.1.0.10
squid-cache squid 3.1.0.11
squid-cache squid 3.1.0.12
squid-cache squid 3.1.0.13
squid-cache squid 3.1.0.14
squid-cache squid 3.1.0.15
squid-cache squid 3.1.0.16
squid-cache squid 3.1.0.17
squid-cache squid 3.1.0.18
squid-cache squid 3.1.1
squid-cache squid 3.1.2
squid-cache squid 3.1.3
squid-cache squid 3.1.4
squid-cache squid 3.1.5
squid-cache squid 3.1.5.1
squid-cache squid 3.1.6
squid-cache squid 3.1.7
squid-cache squid 3.1.8
squid-cache squid 3.1.9
squid-cache squid 3.1.10
squid-cache squid 3.1.11
squid-cache squid 3.1.12
squid-cache squid 3.1.13
squid-cache squid 3.1.14
squid-cache squid 3.2.0.1
squid-cache squid 3.2.0.2
squid-cache squid 3.2.0.3
squid-cache squid 3.2.0.4
squid-cache squid 3.2.0.5
squid-cache squid 3.2.0.6
squid-cache squid 3.2.0.7
squid-cache squid 3.2.0.8
squid-cache squid 3.2.0.9
squid-cache squid 3.2.0.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable1:*:*:*:*:*:*:*",
              "matchCriteriaId": "047EDDD6-02F5-4B53-8FCA-781962392080",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01AD43AB-40BF-449F-A121-A8587E7AE449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3942285D-E20C-45C5-9EF8-821F6D782CB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FDB45B-4D91-4427-9565-812919086E7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable5:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C3C8B5-C2A3-4454-9F89-38A860278366",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B37B7B4-2EAC-4C2A-9526-5C62CBA1DB8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable7:*:*:*:*:*:*:*",
              "matchCriteriaId": "056EDEEE-A09C-47A2-9217-72E4B8387E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2593CB12-03E2-4F98-9B89-C09D5EADE077",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44B7A4F-3070-4092-B9AF-3A1CD0897CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF79D9A9-9C11-4E6D-81D1-32CA8CA95223",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable11:*:*:*:*:*:*:*",
              "matchCriteriaId": "042FE60B-7239-45C7-8EE3-A036AC7778F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FF5EE89A-720F-456A-BD26-FE46BBA29D9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable12:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADF61A74-9CF9-413E-B997-4FAE5BA28939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5605B00F-438B-45CC-A55D-E75E57BC4684",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable14:*:*:*:*:*:*:*",
              "matchCriteriaId": "8316B22E-B016-4F0E-9A3F-383E9B1A85A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable15:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A2C5CB-E2F1-4A72-9EA3-912050AFEF7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable16:*:*:*:*:*:*:*",
              "matchCriteriaId": "574C7DCC-B6E5-42A0-AA44-A0BCD67D1884",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4D0DAD04-02C4-4FC4-BE08-3CAA3B85EB0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2B1F1A5-B435-4A5C-86DF-EC3F29D94417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable18:*:*:*:*:*:*:*",
              "matchCriteriaId": "113EF7A6-3B8D-4A50-8873-FD36FCBF284C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC97E2DA-7378-486B-9178-3B38FF58589B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F178890-2F7E-43F5-8D6D-5EFCD790E758",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable21:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA231EB-0F06-4D13-B50D-76FC8393187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable22:*:*:*:*:*:*:*",
              "matchCriteriaId": "31AB1D33-65EE-46DF-9D29-6B2BFACE7EC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA4744F-5FB2-4DF8-A7B9-A33EAB004CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable24:*:*:*:*:*:*:*",
              "matchCriteriaId": "72023FB9-F081-4F0A-9E81-2AF0470EB278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.0.stable25:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F7D973B-9D57-4F74-89B1-A18CDA388EF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A8586AD-E820-4BAE-AAF9-AC7EF2316C06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "802E3D2B-90B7-4725-854F-4174116BC314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7501697A-BCFD-4DC3-8D87-CC9A186D9589",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D6C4455-85F4-462D-9FF6-F830ED7D398E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B600BF4C-8169-4086-BFE6-F066BE5F5406",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "46272D1B-1468-48C0-B37A-7D06FAC39C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA782B4B-486F-4197-BD5D-ABF791D57211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "558D8641-E097-4D91-9B6E-07433844BB82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B46F5F1-38FC-4E25-8F04-CA2730561DF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C69B0A4D-9619-4BEA-A846-C4438C2660F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED17FE35-6B2C-41BF-A7C7-2EECBDB5A934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "78A50750-3A31-482C-B95C-019C8934850E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF6AC30-9570-4D4B-835E-CCADEB546F46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB84E4E-6A0A-41C8-9DDF-3C18F526F155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E49E5C3-D01F-4DBC-B33A-5495D3EC44F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C53B22-9F33-43E7-8D1F-EEB0DEF4B503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B60DB2-F50C-42F0-B6C9-B25C34B8F578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE973F9E-8387-464F-AFA0-25215B340173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D3F0E3-0C50-4A86-87F4-90FC82B312F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE26BEC0-B9C7-43F0-B0FB-E81870170B29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0778579-A193-4C61-BB1A-6D2E733F3958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED5DC63-6E9D-4068-95DF-AF8FD9A0A7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DE890F9-12C0-4D66-B6C1-6A5A87FAD5F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB414FE3-3567-474B-B5A7-D3EF5DD63AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF450F17-12A2-4E33-875A-5F3C2CA4A5C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3AB229E-2C32-410B-BFE2-62DCA734C3F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78A6D6B0-9BC0-418E-84EE-23697A0FEC19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BF7AFE1-A45A-43B7-B3C7-45C060D046BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41914354-D5BE-4B1F-BED3-0ECA43586537",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE9A3716-8670-4847-A6EB-F601184D369E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E88EE3-EC00-4F1F-BAEF-4F1F893C5C5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A330DFA8-BF79-45CC-BF88-6CEA26D7BC9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "679A55F8-34B4-435A-8BCE-8F842F3FB269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "898674F9-6BF7-469F-A74E-558EAFC2CD27",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DFAB3BA-BBE9-4CFB-BE6B-BDF3E7772E7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9F523B8-463E-4FB0-ACB6-E36AAAF85CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BA593D9-907D-4051-A3F2-0F88F01A7C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D2B364-B98A-4484-A10A-86AF43774096",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B7BF076-0D43-407A-86DC-D1163922A787",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA576F49-A7F5-4013-89DF-F6C91C15B547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3F52FE-FFB3-4221-8DC7-3F5680A07429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "604FEF42-ABA7-42C1-8A5F-C3AECFD68481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC2568C1-89CB-41C1-9126-A8665614D0B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:squid-cache:squid:3.2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18B5392-3FDB-49E6-89DB-7945D337FBFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the gopherToHTML function in gopher.cc in the Gopher reply parser in Squid 3.0 before 3.0.STABLE26, 3.1 before 3.1.15, and 3.2 before 3.2.0.11 allows remote Gopher servers to cause a denial of service (memory corruption and daemon restart) or possibly have unspecified other impact via a long line in a response.  NOTE: This issue exists because of a CVE-2005-0094 regression."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la  v3.0 anterior a v3.0.STABLE26, v3.1 anterior a v3.1.15, y v3.2 anterior a v3.2.0.11 permite a servidores remotos Gopher provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y reinicio del demonio) o posiblemente tener un impacto no especificado a trav\u00e9s de una respuesta demasiado larga. NOTA: Este problema existe debido a una regresi\u00f3n de CVE-2005-0094."
    }
  ],
  "id": "CVE-2011-3205",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-09-06T15:55:08.383",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/08/29/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/08/30/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/08/30/8"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45805"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45906"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45920"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/45965"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/46029"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1025981"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2304"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:150"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/74847"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1293.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/49356"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.squid-cache.org/Advisories/SQUID-2011_3.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065534.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/08/29/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/08/30/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/08/30/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/45965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/46029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/74847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1293.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/49356"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.squid-cache.org/Advisories/SQUID-2011_3.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v2/2.HEAD/changesets/12710.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9193.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10363.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11294.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=734583"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…