{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2012-12-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2016-11-25T20:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"DSA-2631","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2013/dsa-2631"},{"name":"RHSA-2013:0505","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0505.html"},{"name":"MDVSA-2013:129","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:129"},{"name":"1027890","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1027890"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10479.patch"},{"name":"SUSE-SU-2016:1996","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"name":"openSUSE-SU-2013:1443","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html"},{"name":"[oss-security] 20121217 Re: CVE Request -- SQUID-2012:1 / Squid:  DoS (excessive resource consumption) via invalid Content-Length headers or via memory leaks","tags":["mailing-list","x_refsource_MLIST"],"url":"http://openwall.com/lists/oss-security/2012/12/17/4"},{"name":"52024","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/52024"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.squid-cache.org/Advisories/SQUID-2012_1.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=887962"},{"name":"54839","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/54839"},{"name":"SUSE-SU-2016:2089","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"name":"openSUSE-SU-2013:0162","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00052.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=447596"},{"name":"openSUSE-SU-2013:0186","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00075.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368"},{"name":"openSUSE-SU-2013:1436","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html"},{"name":"USN-1713-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://ubuntu.com/usn/usn-1713-1"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T21:14:15.955Z"},"title":"CVE Program Container","references":[{"name":"DSA-2631","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2013/dsa-2631"},{"name":"RHSA-2013:0505","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2013-0505.html"},{"name":"MDVSA-2013:129","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:129"},{"name":"1027890","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1027890"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10479.patch"},{"name":"SUSE-SU-2016:1996","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html"},{"name":"openSUSE-SU-2013:1443","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00032.html"},{"name":"[oss-security] 20121217 Re: CVE Request -- SQUID-2012:1 / Squid:  DoS (excessive resource consumption) via invalid Content-Length headers or via memory leaks","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://openwall.com/lists/oss-security/2012/12/17/4"},{"name":"52024","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/52024"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.squid-cache.org/Advisories/SQUID-2012_1.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=887962"},{"name":"54839","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/54839"},{"name":"SUSE-SU-2016:2089","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html"},{"name":"openSUSE-SU-2013:0162","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00052.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://bugs.gentoo.org/show_bug.cgi?id=447596"},{"name":"openSUSE-SU-2013:0186","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-01/msg00075.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0368"},{"name":"openSUSE-SU-2013:1436","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-updates/2013-09/msg00025.html"},{"name":"USN-1713-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://ubuntu.com/usn/usn-1713-1"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2012-5643","datePublished":"2012-12-20T11:00:00.000Z","dateReserved":"2012-10-24T00:00:00.000Z","dateUpdated":"2024-08-06T21:14:15.955Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}