Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.idefense.com/application/poi/display?id=107&type=vulnerabilities&flashstatus=false http://www.osvdb.org/6791
http://secunia.com/advisories/11804
http://www.squid-cache.org/bugs/show_bug.cgi?id=998 http://www.vuxml.org/freebsd/6f955451-ba54-11d8-b88c-000d610a3b12.html
Insight
The following package is affected: squid
CVE-2004-0541
Buffer overflow in the ntlm_check_auth (NTLM authentication) function for Squid Web Proxy Cache 2.5.x and 3.x, when compiled with NTLM handlers enabled, allows remote attackers to execute arbitrary code via a long password ('pass' variable).
Severity
Classification
-
CVE CVE-2004-0541 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities