Squid is susceptible to a class of attacks known as "HTTP Response Splitting." These attacks involve tricking servers into sending malformed or unexpected HTTP responses by exploiting weaknesses in input validation on dynamic pages. This may in some situations lead to cache poisoning. http://www.squid-cache.org/Advisories/SQUID-2005_5.txt
This issue should also affect RHEL2.1 and RHEL3
*** This bug has been marked as a duplicate of 146161 ***