Squid: Denial of Service vulnerabilities — GLSA 200509-06

Squid contains several bugs when handling certain malformed requests resulting in a Denial of Service.

Affected packages

net-proxy/squid on all architectures
Affected versions < 2.5.10-r2
Unaffected versions >= 2.5.10-r2

Background

Squid is a full-featured Web proxy cache designed to run on Unix-like systems. It supports proxying and caching of HTTP, FTP, and other protocols, as well as SSL support, cache hierarchies, transparent caching, access control lists and many more features.

Description

Certain malformed requests result in a segmentation fault in the sslConnectTimeout function, handling of other certain requests trigger assertion failures.

Impact

By performing malformed requests an attacker could cause Squid to crash by triggering an assertion failure or invalid memory reference.

Workaround

There is no known workaround at this time.

Resolution

All Squid users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.10-r2"

References

Release date
September 07, 2005

Latest revision
May 22, 2006: 03

Severity
normal

Exploitable
remote

Bugzilla entries