FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

squid -- HTTP response splitting cache pollution attack

Affected packages
squid < 2.5.7_8

Details

VuXML ID 4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3
Discovery 2004-03-01
Entry 2005-01-22
Modified 2005-02-07

According to a whitepaper published by Sanctum, Inc., it is possible to mount cache poisoning attacks against, among others, squid proxies by inserting false replies into the HTTP stream.

The squid patches page notes:

This patch additionally strengthens Squid from the HTTP response attack described by Sanctum.

References

CERT/CC Vulnerability Note 625878
CVE Name CVE-2005-0175
URL http://www.squid-cache.org/bugs/show_bug.cgi?id=1200
URL http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting
URL https://www.watchfire.com/securearea/whitepapers.aspx?id=8