logo
DATABASE RESOURCES PRICING ABOUT US

Important: squid

Description

**Issue Overview:** A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609) A buffer overflow flaw was found in Squid's DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115) Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management. (CVE-2014-0128) **Affected Packages:** squid **Issue Correction:** Run _yum update squid_ to update your system. **New Packages:** i686:     squid-3.1.10-29.17.amzn1.i686     squid-debuginfo-3.1.10-29.17.amzn1.i686 src:     squid-3.1.10-29.17.amzn1.src x86_64:     squid-3.1.10-29.17.amzn1.x86_64     squid-debuginfo-3.1.10-29.17.amzn1.x86_64 ### Additional References Red Hat: [CVE-2013-4115](<https://access.redhat.com/security/cve/CVE-2013-4115>), [CVE-2014-0128](<https://access.redhat.com/security/cve/CVE-2014-0128>), [CVE-2014-3609](<https://access.redhat.com/security/cve/CVE-2014-3609>) Mitre: [CVE-2013-4115](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4115>), [CVE-2014-0128](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128>), [CVE-2014-3609](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609>)


Affected Package


OS OS Version Package Name Package Version
Amazon Linux 1 squid 3.1.10-29.17.amzn1
Amazon Linux 1 squid-debuginfo 3.1.10-29.17.amzn1
Amazon Linux 1 squid 3.1.10-29.17.amzn1
Amazon Linux 1 squid 3.1.10-29.17.amzn1
Amazon Linux 1 squid-debuginfo 3.1.10-29.17.amzn1

Related