The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.Referenceshttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047820.htmlhttp://www.openwall.com/lists/oss-security/2010/09/05/2https://bugzilla.redhat.com/show_bug.cgi?id=630444http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047787.htmlhttp://secunia.com/advisories/41298http://www.vupen.com/english/advisories/2010/2433http://www.squid-cache.org/Advisories/SQUID-2010_3.txthttp://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9189.patchhttp://secunia.com/advisories/41477http://www.debian.org/security/2010/dsa-2111http://www.securityfocus.com/bid/42982http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10090.patchhttp://secunia.com/advisories/41534http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlhttp://www.openwall.com/lists/oss-security/2010/09/07/7