Lucene search

K
gentooGentoo FoundationGLSA-200509-06
HistorySep 07, 2005 - 12:00 a.m.

Squid: Denial of Service vulnerabilities

2005-09-0700:00:00
Gentoo Foundation
security.gentoo.org
11

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.192 Low

EPSS

Percentile

96.3%

Background

Squid is a full-featured Web proxy cache designed to run on Unix-like systems. It supports proxying and caching of HTTP, FTP, and other protocols, as well as SSL support, cache hierarchies, transparent caching, access control lists and many more features.

Description

Certain malformed requests result in a segmentation fault in the sslConnectTimeout function, handling of other certain requests trigger assertion failures.

Impact

By performing malformed requests an attacker could cause Squid to crash by triggering an assertion failure or invalid memory reference.

Workaround

There is no known workaround at this time.

Resolution

All Squid users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.10-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-proxy/squid< 2.5.10-r2UNKNOWN

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.192 Low

EPSS

Percentile

96.3%