Bug 1311584 - squid: Multiple Denial of Service issues in HTTP Response processing
Summary: squid: Multiple Denial of Service issues in HTTP Response processing
Keywords:
Status: CLOSED DUPLICATE of bug 1312257
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1311585 1312267
Blocks: 1311588
TreeView+ depends on / blocked
 
Reported: 2016-02-24 14:14 UTC by Adam Mariš
Modified: 2021-02-17 04:18 UTC (History)
5 users (show)

Fixed In Version: squid 3.5.15, squid 4.0.7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-03-02 15:09:38 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-02-24 14:14:23 UTC
Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses. Squid-4 is due to incorrect error handling vulnerable to a denial of service attack when processing malformed HTTP responses.

These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.

Upstream patches:

http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch

External Reference:

http://www.squid-cache.org/Advisories/SQUID-2016_2.txt

Comment 1 Adam Mariš 2016-02-24 14:14:51 UTC
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1311585]

Comment 2 Adam Mariš 2016-02-24 15:15:11 UTC
CVE request:

http://seclists.org/oss-sec/2016/q1/422

Comment 3 Adam Mariš 2016-03-02 15:09:38 UTC

*** This bug has been marked as a duplicate of bug 1312257 ***


Note You need to log in before you can comment on or make changes to this bug.