CVE-2012-5643

CVSS V2 Medium 5 CVSS V3 None
Description
Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
Overview
  • CVE ID
  • CVE-2012-5643
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2012-12-20T12:02:19
  • Last Modified Date
  • 2023-02-13T00:27:05
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:squid-cache:squid:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.7:stable3:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:2.7:stable4:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre1:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre2:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre3:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre4:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre5:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre6:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:-:pre7:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0:rc4:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.0.stable25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.1.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:squid-cache:squid:3.3.0.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
History
Created Old Value New Value Data Type Notes
2022-05-10 10:06:31 Added to TrackCVE
2023-02-02 19:03:47 2023-02-02T18:16:51 CVE Modified Date updated
2023-02-02 19:03:47 Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials. CVE-2012-5643 squid: cachemgr.cgi memory usage DoS and memory leaks Description updated
2023-02-13 01:04:09 2023-02-13T00:27:05 CVE Modified Date updated
2023-02-13 01:04:11 CVE-2012-5643 squid: cachemgr.cgi memory usage DoS and memory leaks Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials. Description updated