Unrated severityNVD Advisory· Published Dec 4, 2007· Updated Apr 23, 2026
CVE-2007-6239
CVE-2007-6239
Description
The "cache update reply processing" functionality in Squid 2.x before 2.6.STABLE17 and Squid 3.0 allows remote attackers to cause a denial of service (crash) via unknown vectors related to HTTP headers and an Array memory leak during requests for cached objects.
Affected products
38cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable4:*:*:*:*:*:*:*+ 37 more
- cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable7:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable11:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable10:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable1:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable3:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable7:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable12:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable13:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable14:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable15:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.6.stable16:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre1:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:3.0_pre3:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.0_patch2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.1_patch2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.3.stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.4_stable2:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable12:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable13:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5.stable14:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_.stable9:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable1:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable3:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable7:*:*:*:*:*:*:*
- cpe:2.3:a:squid:squid_web_proxy_cache:2.5_stable8:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
27- secunia.com/advisories/27910nvdPatchVendor Advisory
- www.debian.org/security/2008/dsa-1482nvdPatch
- www.redhat.com/support/errata/RHSA-2007-1130.htmlnvdPatch
- www.securityfocus.com/bid/26687nvdPatch
- www.squid-cache.org/Advisories/SQUID-2007_2.txtnvdPatchVendor Advisory
- www.squid-cache.org/Versions/v2/2.6/changesets/11780.patchnvdExploitVendor Advisory
- secunia.com/advisories/28091nvdVendor Advisory
- secunia.com/advisories/28109nvdVendor Advisory
- secunia.com/advisories/28350nvdVendor Advisory
- secunia.com/advisories/28381nvdVendor Advisory
- secunia.com/advisories/28403nvdVendor Advisory
- secunia.com/advisories/28412nvdVendor Advisory
- secunia.com/advisories/28814nvdVendor Advisory
- secunia.com/advisories/34467nvdVendor Advisory
- www.vupen.com/english/advisories/2007/4066nvdVendor Advisory
- www.kb.cert.org/vuls/id/232881nvdUS Government Resource
- bugs.gentoo.org/show_bug.cginvd
- lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.htmlnvd
- security.gentoo.org/glsa/glsa-200801-05.xmlnvd
- security.gentoo.org/glsa/glsa-200903-38.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.securitytracker.com/idnvd
- www.ubuntu.com/usn/usn-565-1nvd
- bugzilla.redhat.com/show_bug.cginvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10915nvd
- www.redhat.com/archives/fedora-package-announce/2007-December/msg00497.htmlnvd
- www.redhat.com/archives/fedora-package-announce/2007-December/msg00507.htmlnvd
News mentions
0No linked articles in our index yet.