Lucene search

K
debianDebianDEBIAN:DSA-3014-1:C61DA
HistoryAug 28, 2014 - 3:36 p.m.

[SECURITY] [DSA 3014-1] squid3 security update

2014-08-2815:36:10
lists.debian.org
4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P


Debian Security Advisory DSA-3014-1 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
August 28, 2014 http://www.debian.org/security/faq


Package : squid3
CVE ID : CVE-2014-3609
Debian Bug : 759509

Matthew Daley discovered that Squid3, a fully featured web proxy cache,
did not properly perform input validation in request parsing. A remote
attacker could use this flaw to mount a denial of service by sending
crafted Range requests.

For the stable distribution (wheezy), this problem has been fixed in
version 3.1.20-2.2+deb7u2.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your squid3 packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

Related for DEBIAN:DSA-3014-1:C61DA