The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:53:32.679Z
Reserved: 2011-10-18T00:00:00
Link: CVE-2011-4096

No data.

Status : Modified
Published: 2011-11-17T19:55:01.453
Modified: 2024-11-21T01:31:50.260
Link: CVE-2011-4096
