From aee04e84c357d037c5c42a4e2bc262677b3c19de Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Dag-Erling=20Sm=C3=B8rgrav?= Date: Wed, 9 Jun 2004 20:38:33 +0000 Subject: [PATCH] Add CAN-2004-0541 (buffer overflow in Squid NTLM authentication helper) --- security/vuxml/vuln.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0a6e34320351..c3f9067213a4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -30,6 +30,36 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + Buffer overflow in Squid NTLM authentication helper + + + squid + 2.5.5_9 + + + + +

Remote exploitation of a buffer overflow vulnerability in + the NTLM authentication helper routine of the Squid Web + Proxy Cache could allow a remote attacker to execute + arbitrary code. A remote attacker can compromise a target + system if the Squid Proxy is configured to use the NTLM + authentication helper. The attacker can send an overly long + password to overflow the buffer and execute arbitrary + code.

+ +
+ + http://www.idefense.com/application/poi/display?id=107&type=vulnerabilities&flashstatus=false + CAN-2004-0541 + + + 2004-05-20 + 2004-06-09 + +
+ jailed processes can manipulate host routing tables