exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Squid Denial Of Service

Squid Denial Of Service
Posted Feb 4, 2009
Site squid-cache.org

Squid Proxy Cache Security Update Advisory SQUID-2009:1 - Due to an internal error Squid is vulnerable to a denial of service attack when processing specially crafted requests. Versions 2.7 up through STABLE5, 3.0 up through STABLE12, and 3.1.0.4 are affected.

tags | advisory, denial of service
SHA-256 | 35ff4b2f0ec1ca6a40c33d294aa23914b6f2ac816fc88f8652ef3a659b5fa52a

Squid Denial Of Service

Change Mirror Download
__________________________________________________________________

Squid Proxy Cache Security Update Advisory SQUID-2009:1
__________________________________________________________________

Advisory ID: SQUID-2009:1
Date: February 02, 2009
Summary: Denial of service in request processing
Affected versions: Squid 2.7 -> 2.7.STABLE5,
Squid 3.0 -> 3.0.STABLE12,
Squid 3.1 -> 3.1.0.4
Fixed in version: Squid 2.7.STABLE6, 3.0.STABLE13, 3.1.0.5
__________________________________________________________________

http://www.squid-cache.org/Advisories/SQUID-2009_1.txt
__________________________________________________________________

Problem Description:

Due to an internal error Squid is vulnerable to a denial
of service attack when processing specially crafted requests.

__________________________________________________________________

Severity:

This problem allows any client to perform a denial of service
attack on the Squid service.

__________________________________________________________________

Updated Packages:

This bug is fixed by Squid versions 2.7.STABLE6, 3.0.STABLE13,
and 3.1.0.5.

In addition, patches addressing this problem can be found In
our patch archives:

Squid 2.7:
http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch
http://www.squid-cache.org/Versions/v2/2.7/changesets/12442.patch

Squid 3.0:
http://www.squid-cache.org/Versions/v3/3.0/changesets/b8964.patch
http://www.squid-cache.org/Versions/v3/3.0/changesets/b8965.patch

Squid 3.1:
http://www.squid-cache.org/Versions/v3/3.1/changesets/b9414.patch
http://www.squid-cache.org/Versions/v3/3.1/changesets/b9418.patch


If you are using a prepackaged version of Squid then please refer
to the package vendor for availability information on updated
packages.

__________________________________________________________________

Determining if your version is vulnerable:

All Squid-2.7 versions up to, and including 2.7.STABLE5 are
vulnerable.

All Squid-3.0 versions up to and including 3.0.STABLE12 are
vulnerable.

All Squid-3.1 beta versions up to and including 3.1.0.4 are
vulnerable.

__________________________________________________________________

Workarounds:

None.
__________________________________________________________________

Contact details for the Squid project:

For installation / upgrade support on binary packaged versions
of Squid: Your first point of contact should be your binary
package vendor.

If your install and build Squid from the original Squid sources
then the squid-users@squid-cache.org mailing list is your primary
support point. For subscription details see
<http://www.squid-cache.org/Support/mailing-lists.html>.

For reporting of non-security bugs in the latest STABLE release
the squid bugzilla database should be used
<http://www.squid-cache.org/bugs/>.

For reporting of security sensitive bugs send an email to the
squid-bugs@squid-cache.org mailing list. It's a closed list
(though anyone can post) and security related bug reports are
treated in confidence until the impact has been established.

__________________________________________________________________

Credits:

The vulnerability was discovered by Joshua Morin, Mikko Varpiola
and Jukka Taimisto from the CROSS project at Codenomicon Ltd.

__________________________________________________________________

Revision history:

2009-02-02 13:12 GMT Initial version
__________________________________________________________________
END
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close