[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 1266-1] squid3 security update



Package        : squid3
Version        : 3.1.20-2.2+deb7u8
CVE ID         : CVE-2018-1000024 CVE-2018-1000027
Debian Bug     : 888719 888720


Squid, a high-performance proxy caching server for web clients, has been
found vulnerable to denial of service attacks associated with ESI
response processing and intermediate CA certificate downloading.

CVE-2018-1000024

    Incorrect pointer handling resulted in the ability of a remote
    server to return a crafted ESI response which could trigger a denial
    of service for all clients accessing the Squid service. This issue
    affects the Squid custom ESI parser. 

CVE-2018-1000027

    Incorrect pointer handling resulted in the possibility of a remote
    client delivering certain HTTP requests in conjunction with certain
    trusted server reponses involving the processing of ESI responses or
    downloading of intermediate CA certificates to trigger a denial of
    service for all clients accessing the squid service.

For Debian 7 "Wheezy", these problems have been fixed in version
3.1.20-2.2+deb7u8.

We recommend that you upgrade your squid3 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature


Reply to: