{ "schema_version": "1.4.0", "id": "GHSA-w7j3-4592-9f4v", "modified": "2022-05-01T23:37:17Z", "published": "2022-05-01T23:37:17Z", "aliases": [ "CVE-2008-1167" ], "details": "Stack-based buffer overflow in the useragent function in useragent.c in Squid Analysis Report Generator (Sarg) 2.2.3.1 allows remote attackers to execute arbitrary code via a long Squid proxy server User-Agent header. NOTE: some of these details are obtained from third party information.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1167" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/40970" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/28668" }, { "type": "WEB", "url": "http://secunia.com/advisories/29309" }, { "type": "WEB", "url": "http://secunia.com/advisories/29323" }, { "type": "WEB", "url": "http://secunia.com/advisories/29500" }, { "type": "WEB", "url": "http://sourceforge.net/project/shownotes.php?release_id=581212" }, { "type": "WEB", "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-21.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:079" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/489018/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28077" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019536" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0749" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-03-05T23:44:00Z" } }