<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf"
><DocumentTitle xml:lang="en"
>CVE-2009-0478</DocumentTitle
><DocumentType
>SUSE CVE</DocumentType
><DocumentPublisher Type="Vendor"
><ContactDetails
>security@suse.de</ContactDetails
><IssuingAuthority
>SUSE Security Team</IssuingAuthority
></DocumentPublisher
><DocumentTracking
><Identification
><ID
>SUSE CVE-2009-0478</ID
></Identification
><Status
>Interim</Status
><Version
>1</Version
><RevisionHistory
><Revision
><Number
>1</Number
><Date
>2024-10-03T02:41:58Z</Date
><Description
>current</Description
></Revision
></RevisionHistory
><InitialReleaseDate
>2024-10-03T02:41:58Z</InitialReleaseDate
><CurrentReleaseDate
>2024-10-03T02:41:58Z</CurrentReleaseDate
><Generator
><Engine
>cve-database/bin/generate-cvrf-cve.pl</Engine
><Date
>2020-12-27T01:00:00Z</Date
></Generator
></DocumentTracking
><DocumentNotes
><Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en"
>CVE-2009-0478</Note
><Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en"
>Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.</Note
><Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en"
>The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note
></DocumentNotes
><DocumentReferences
><Reference Type="Self"
><URL
>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOHF3XMVGZGF7VSMUC3CQB3ZBKRU3DLE/#IOHF3XMVGZGF7VSMUC3CQB3ZBKRU3DLE</URL
><Description
>E-Mail link for SUSE-SR:2009:005</Description
></Reference
><Reference Type="Self"
><URL
>https://www.suse.com/support/security/rating/</URL
><Description
>SUSE Security Ratings</Description
></Reference
></DocumentReferences
><ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod"
><Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP1"
><Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP1"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1" CPE="cpe:/o:suse:suse_sles:11:sp1"
>SUSE Linux Enterprise Server 11 SP1</FullProductName
></Branch
></Branch
><Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2"
><Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2" CPE="cpe:/o:suse:suse_sles:11:sp2"
>SUSE Linux Enterprise Server 11 SP2</FullProductName
></Branch
></Branch
><Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3"
><Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3"
>SUSE Linux Enterprise Server 11 SP3</FullProductName
></Branch
></Branch
><Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4"
><Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4"
>SUSE Linux Enterprise Server 11 SP4</FullProductName
></Branch
></Branch
><Branch Type="Product Version" Name="squid-2.7.STABLE5-2.10.1"
><FullProductName ProductID="squid-2.7.STABLE5-2.10.1" CPE="cpe:2.3:a:squid-cache:squid:2.7.STABLE5:*:*:*:*:*:*:*"
>squid-2.7.STABLE5-2.10.1</FullProductName
></Branch
><Branch Type="Product Version" Name="squid-2.7.STABLE5-2.12.12.1"
><FullProductName ProductID="squid-2.7.STABLE5-2.12.12.1" CPE="cpe:2.3:a:squid-cache:squid:2.7.STABLE5:*:*:*:*:*:*:*"
>squid-2.7.STABLE5-2.12.12.1</FullProductName
></Branch
><Branch Type="Product Version" Name="squid-2.7.STABLE5-2.12.16.1"
><FullProductName ProductID="squid-2.7.STABLE5-2.12.16.1" CPE="cpe:2.3:a:squid-cache:squid:2.7.STABLE5:*:*:*:*:*:*:*"
>squid-2.7.STABLE5-2.12.16.1</FullProductName
></Branch
><Branch Type="Product Version" Name="squid-2.7.STABLE5-2.4.1"
><FullProductName ProductID="squid-2.7.STABLE5-2.4.1" CPE="cpe:2.3:a:squid-cache:squid:2.7.STABLE5:*:*:*:*:*:*:*"
>squid-2.7.STABLE5-2.4.1</FullProductName
></Branch
><Relationship ProductReference="squid-2.7.STABLE5-2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP1"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP1:squid-2.7.STABLE5-2.4.1"
>squid-2.7.STABLE5-2.4.1 as a component of SUSE Linux Enterprise Server 11 SP1</FullProductName
></Relationship
><Relationship ProductReference="squid-2.7.STABLE5-2.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2:squid-2.7.STABLE5-2.10.1"
>squid-2.7.STABLE5-2.10.1 as a component of SUSE Linux Enterprise Server 11 SP2</FullProductName
></Relationship
><Relationship ProductReference="squid-2.7.STABLE5-2.12.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:squid-2.7.STABLE5-2.12.12.1"
>squid-2.7.STABLE5-2.12.12.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName
></Relationship
><Relationship ProductReference="squid-2.7.STABLE5-2.12.16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4"
><FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:squid-2.7.STABLE5-2.12.16.1"
>squid-2.7.STABLE5-2.12.16.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName
></Relationship
></ProductTree
><Vulnerability Ordinal="1" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln"
><Notes
><Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en"
>Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.</Note
></Notes
><CVE
>CVE-2009-0478</CVE
><ProductStatuses
><Status Type="Fixed"
><ProductID
>SUSE Linux Enterprise Server 11 SP1:squid-2.7.STABLE5-2.4.1</ProductID
><ProductID
>SUSE Linux Enterprise Server 11 SP2:squid-2.7.STABLE5-2.10.1</ProductID
><ProductID
>SUSE Linux Enterprise Server 11 SP3:squid-2.7.STABLE5-2.12.12.1</ProductID
><ProductID
>SUSE Linux Enterprise Server 11 SP4:squid-2.7.STABLE5-2.12.16.1</ProductID
></Status
></ProductStatuses
><Threats
><Threat Type="Impact"
><Description
>moderate</Description
></Threat
></Threats
><CVSSScoreSets
><ScoreSetV2
><BaseScoreV2
>5</BaseScoreV2
><VectorV2
>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2
></ScoreSetV2
></CVSSScoreSets
></Vulnerability
></cvrfdoc
>
