Bug 1308865 (CVE-2016-2390) - CVE-2016-2390 squid: incorrect server error handling resulting in denial of service
Summary: CVE-2016-2390 squid: incorrect server error handling resulting in denial of s...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2016-2390
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1308866
Blocks: 1308870
TreeView+ depends on / blocked
 
Reported: 2016-02-16 10:26 UTC by Andrej Nemec
Modified: 2019-10-10 11:13 UTC (History)
7 users (show)

Fixed In Version: squid 3.5.14, squid 4.0.6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-04-05 08:44:44 UTC


Attachments (Terms of Use)

Description Andrej Nemec 2016-02-16 10:26:57 UTC
Due to incorrectly handling server errors Squid is vulnerable to
a denial of service attack when connecting to TLS or SSL servers.
This problem allows any trusted client to perform a denial of
service attack on the Squid service regardless of whether TLS or
SSL is configured for use in the proxy.

Upstream advisory:

http://www.squid-cache.org/Advisories/SQUID-2016_1.txt

CVE request:

http://seclists.org/oss-sec/2016/q1/345

Comment 1 Andrej Nemec 2016-02-16 10:27:20 UTC
Created squid tracking bugs for this issue:

Affects: fedora-all [bug 1308866]

Comment 2 Andrej Nemec 2016-02-16 15:18:56 UTC
CVE assignment:

http://seclists.org/oss-sec/2016/q1/348

Comment 3 Luboš Uhliarik ✈ 2016-03-01 12:52:38 UTC
Fix committed to F24 and RAWHIDE.

Comment 7 Cedric Buissart 🐶 2016-04-05 08:43:38 UTC
Statement:

This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux versions 5, 6 and 7, as they are not shipped with a vulnerable version of squid, and no currently backported patch would introduce the bug.


Note You need to log in before you can comment on or make changes to this bug.