Bug 630444 (CVE-2010-3072) - CVE-2010-3072 Squid: Denial of service due internal error in string handling (SQUID-2010:3)
Summary: CVE-2010-3072 Squid: Denial of service due internal error in string handling ...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-3072
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 630445 688482
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-09-05 16:09 UTC by Jan Lieskovsky
Modified: 2021-02-24 22:29 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-05-19 14:04:25 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:0545 0 normal SHIPPED_LIVE Low: squid security and bug fix update 2011-05-19 11:34:53 UTC

Description Jan Lieskovsky 2010-09-05 16:09:48 UTC
A denial of service flaw was found in the way Squid proxy caching
server internally processed NULL buffers. A remote, trusted client
could use this flaw to cause squid daemon crash (dereference NULL pointer)
when processing specially-crafted request.

References:
  [1] http://www.squid-cache.org/Advisories/SQUID-2010_3.txt

Upstream patch (against Squid v3.0):
  [2] http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9189.patch

Upstream patch (against Squid v3.1):
  [3] http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10090.patch

Credit:
  The vulnerability was discovered by Phil Oester.

Comment 1 Jan Lieskovsky 2010-09-05 16:11:28 UTC
This issue affects the versions of the squid package, as shipped with
Fedora release of 12 and 13.

Please fix.

Comment 2 Jan Lieskovsky 2010-09-05 16:12:27 UTC
Created squid tracking bugs for this issue

Affects: fedora-all [bug 630445]

Comment 3 Henrik Nordström 2010-09-05 16:18:29 UTC
update fixing this is already in updates for F13 and updates-testing for F12

https://admin.fedoraproject.org/updates/squid-3.1.7-1.fc13
https://admin.fedoraproject.org/updates/squid-3.1.7-1.fc12.1

Comment 4 Henrik Nordström 2010-09-05 16:28:37 UTC
correction. those updates are vulnerable. sorry for the confusion.

Comment 5 Jan Lieskovsky 2010-09-05 16:40:42 UTC
This issue did NOT affect the versions of the squid package, as shippped
with Red Hat Enterprise Linux 3, 4, or 5.

Comment 7 Jan Lieskovsky 2010-09-08 10:11:33 UTC
The CVE identifier of CVE-2010-3072 has been assigned to this issue.

Comment 8 Vincent Danen 2010-09-10 17:51:26 UTC
Statement:

This issue did not affect the version of Squid as shipped with Red Hat Enterprise Linux 3, 4, or 5.  It was corrected in Red Hat Enterprise Linux 6 via RHSA-2011:0545.

Comment 10 errata-xmlrpc 2011-05-19 11:34:58 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0545 https://rhn.redhat.com/errata/RHSA-2011-0545.html


Note You need to log in before you can comment on or make changes to this bug.