Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-07/0362.html - Patch, Vendor Advisory | |
References | () http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-031-01 - Patch, Vendor Advisory | |
References | () http://www.calderasystems.com/support/security/advisories/CSSA-2001-029.0.txt - | |
References | () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-066.php3 - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-097.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/197727 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6862 - |
Information
Published : 2001-07-18 04:00
Updated : 2024-11-20 23:36
NVD link : CVE-2001-1030
Mitre link : CVE-2001-1030
CVE.ORG link : CVE-2001-1030
JSON object : View
Products Affected
squid
- squid_web_proxy
mandrakesoft
- mandrake_single_network_firewall
- mandrake_linux_corporate_server
- mandrake_linux
immunix
- immunix
trustix
- secure_linux
caldera
- openlinux_server
redhat
- linux
CWE