Lucene search

K
amazonAmazonALAS-2014-433
HistoryOct 22, 2014 - 8:04 p.m.

Important: squid

2014-10-2220:04:00
alas.aws.amazon.com
24

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%

Issue Overview:

A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609)

A buffer overflow flaw was found in Squid’s DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115)

Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management. (CVE-2014-0128)

Affected Packages:

squid

Issue Correction:
Run yum update squid to update your system.

New Packages:

i686:  
    squid-3.1.10-29.17.amzn1.i686  
    squid-debuginfo-3.1.10-29.17.amzn1.i686  
  
src:  
    squid-3.1.10-29.17.amzn1.src  
  
x86_64:  
    squid-3.1.10-29.17.amzn1.x86_64  
    squid-debuginfo-3.1.10-29.17.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-4115, CVE-2014-0128, CVE-2014-3609

Mitre: CVE-2013-4115, CVE-2014-0128, CVE-2014-3609

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.962 High

EPSS

Percentile

99.5%