Академический Документы
Профессиональный Документы
Культура Документы
XAMPP 1.7.3
SQUID 2.6
unauthenticated attackers can exploit this vulnerability by sending specially crafted HTTP request packets
containing malicious HTTP headers. Successful exploitation would consume system resources and may cause
the service to terminate.
Squid 2.6. Has a flaw in the way it manipulated HTTP headers for cached objects stored in system memory.
An attacker could use this flaw to cause a squid child process to exit. This interrupted existing connections
and made proxy services unavailable. Note: the parent squid process started a new child process, so this
attack only resulted in a temporary denial of service.
SAMBA 3.4