Upstream information
Description
Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 5 | 
| Vector | AV:N/AC:L/Au:N/C:N/I:N/A:P | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | None | 
| Availability Impact | Partial | 
SUSE Security Advisories:
- SUSE-SR:2009:005, published Mon, 02 Mar 2009 13:00:00 +0000
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| SUSE Linux Enterprise Server 11 SP1 | 
  |  Patchnames:  SUSE Linux Enterprise Server 11 SP1 GA squid-2.7.STABLE5-2.4.1  | 
| SUSE Linux Enterprise Server 11 SP2 | 
  |  Patchnames:  SUSE Linux Enterprise Server 11 SP2 GA squid-2.7.STABLE5-2.10.1  | 
| SUSE Linux Enterprise Server 11 SP3 | 
  |  Patchnames:  SUSE Linux Enterprise Server 11 SP3 GA squid-2.7.STABLE5-2.12.12.1  | 
| SUSE Linux Enterprise Server 11 SP4 | 
  |  Patchnames:  SUSE Linux Enterprise Server 11 SP4 GA squid-2.7.STABLE5-2.12.16.1  | 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:27:03 2013CVE page last modified: Mon Oct 6 18:15:37 2025