Bug 1311584 - squid: Multiple Denial of Service issues in HTTP Response processing
squid: Multiple Denial of Service issues in HTTP Response processing
Status: CLOSED DUPLICATE of bug 1312257
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20160223,repor...
: Security
Depends On: 1311585 1312267
Blocks: 1311588
  Show dependency treegraph
 
Reported: 2016-02-24 09:14 EST by Adam Mariš
Modified: 2016-03-02 10:12 EST (History)
5 users (show)

See Also:
Fixed In Version: squid 3.5.15, squid 4.0.7
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-03-02 10:09:38 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-02-24 09:14:23 EST
Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses. Squid-4 is due to incorrect error handling vulnerable to a denial of service attack when processing malformed HTTP responses.

These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.

Upstream patches:

http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch

External Reference:

http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
Comment 1 Adam Mariš 2016-02-24 09:14:51 EST
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1311585]
Comment 2 Adam Mariš 2016-02-24 10:15:11 EST
CVE request:

http://seclists.org/oss-sec/2016/q1/422
Comment 3 Adam Mariš 2016-03-02 10:09:38 EST

*** This bug has been marked as a duplicate of bug 1312257 ***

Note You need to log in before you can comment on or make changes to this bug.