From a57877665c0e9e48f59d777ac3384419ef7723b5 Mon Sep 17 00:00:00 2001 From: Remko Lodder Date: Mon, 20 Feb 2006 19:15:17 +0000 Subject: Remove the latest squid entry, it already existed. Noticed by: Thomas-Martin Seck --- security/vuxml/vuln.xml | 28 ---------------------------- 1 file changed, 28 deletions(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e2e40be486bd..115ca8d411b9 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -158,34 +158,6 @@ Note: Please add new entries to the beginning of this file. - - squid -- dns lookup spoofing - - - squid - 2.5.10 - - - - -

The Squid team reports:

-
-

Malicious users may spoof DNS lookups if the DNS client UDP - port (random, assigned by OS at startup) is unfiltered and - your network is not protected from IP spoofing.

-
- -
- - CVE-2005-1519 - http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query - - - 2005-05-11 - 2006-02-20 - -
- postgresql81-server -- SET ROLE privilege escalation -- cgit v1.2.3