Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.863626
Category:Fedora Local Security Checks
Title:Fedora Update for squid FEDORA-2011-15233
Summary:The remote host is missing an update for the 'squid'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'squid'
package(s) announced via the referenced advisory.

Affected Software/OS:
squid on Fedora 15

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-4096
1026265
http://www.securitytracker.com/id?1026265
46609
http://secunia.com/advisories/46609
47459
http://secunia.com/advisories/47459
MDVSA-2011:193
http://www.mandriva.com/security/advisories?name=MDVSA-2011:193
RHSA-2011:1791
http://www.redhat.com/support/errata/RHSA-2011-1791.html
SUSE-SU-2016:1996
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
SUSE-SU-2016:2089
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
[oss-security] 20111031 CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
http://www.openwall.com/lists/oss-security/2011/10/31/5
[oss-security] 20111031 Re: CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
http://www.openwall.com/lists/oss-security/2011/11/01/3
http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12
http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.