Unrated severityNVD Advisory· Published May 2, 2005· Updated Apr 16, 2026
CVE-2005-0241
CVE-2005-0241
Description
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling "oversized" HTTP reply headers, which might allow remote attackers to poison the cache or bypass access controls based on header size.
Affected products
7cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:a:squid:squid:2.5.stable1:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable3:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid:2.5.stable7:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- distro.conectiva.com.br/atualizacoes/nvdPatch
- www.kb.cert.org/vuls/id/823350nvdPatchThird Party AdvisoryUS Government Resource
- www.novell.com/linux/security/advisories/2005_06_squid.htmlnvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2005-060.htmlnvdPatchVendor Advisory
- www.redhat.com/support/errata/RHSA-2005-061.htmlnvdPatchVendor Advisory
- www.squid-cache.org/Versions/v2/2.5/bugs/nvdPatch
- www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patchnvdPatch
- www.squid-cache.org/bugs/show_bug.cginvdPatch
- fedoranews.org/updates/FEDORA--.shtmlnvd
- secunia.com/advisories/14091nvd
- www.securityfocus.com/bid/12412nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/19060nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10998nvd
News mentions
0No linked articles in our index yet.