{"id":"CVE-2009-3826","details":"Multiple buffer overflows in squidGuard 1.4 allow remote attackers to bypass intended URL blocking via a long URL, related to (1) the relationship between a certain buffer size in squidGuard and a certain buffer size in Squid and (2) a redirect URL that contains information about the originally requested URL.","modified":"2026-04-10T03:40:57.460705Z","published":"2009-10-28T14:30:00Z","related":["openSUSE-SU-2024:10562-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/37107"},{"type":"ADVISORY","url":"http://secunia.com/advisories/39679"},{"type":"ADVISORY","url":"http://www.debian.org/security/2010/dsa-2040"},{"type":"ADVISORY","url":"http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2009/3013"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2010/1043"},{"type":"FIX","url":"http://www.securityfocus.com/bid/36800"},{"type":"FIX","url":"http://www.vupen.com/english/advisories/2009/3013"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"},{"type":"WEB","url":"http://securitytracker.com/id?1023079"},{"type":"WEB","url":"http://www.osvdb.org/59164"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/507440/100/0/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/53922"}],"schema_version":"1.7.5"}