Debian Security Advisory
DLA-478-1 squid3 -- LTS security update
- Date Reported:
- 16 May 2016
- Affected Packages:
- squid3
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 823968.
In Mitre's CVE dictionary: CVE-2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, CVE-2016-4554, CVE-2016-4555, CVE-2016-4556. - More information:
-
Several security issues have been discovered in the Squid caching proxy.
- CVE-2016-4051
CESG and Yuriy M. Kaminskiy discovered that Squid cachemgr.cgi was vulnerable to a buffer overflow when processing remotely supplied inputs relayed through Squid.
- CVE-2016-4052
CESG discovered that a buffer overflow made Squid vulnerable to a Denial of Service (DoS) attack when processing ESI responses.
- CVE-2016-4053
CESG found that Squid was vulnerable to public information disclosure of the server stack layout when processing ESI responses.
- CVE-2016-4054
CESG discovered that Squid was vulnerable to remote code execution when processing ESI responses.
- CVE-2016-4554
Jianjun Chen found that Squid was vulnerable to a header smuggling attack that could lead to cache poisoning and to bypass of same-origin security policy in Squid and some client browsers.
- CVE-2016-4555
and CVE-2016-4556
"bfek-18" and "@vftable" found that Squid was vulnerable to a Denial of Service (DoS) attack when processing ESI responses, due to incorrect pointer handling and reference counting.
For Debian 7
Wheezy
, these issues have been fixed in squid3 version 3.1.20-2.2+deb7u5. We recommend you to upgrade your squid3 packages. - CVE-2016-4051