Debian Security Advisory
DLA-1266-1 squid3 -- LTS security update
- Date Reported:
- 02 Feb 2018
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 888719, Bug 888720.
In Mitre's CVE dictionary: CVE-2018-1000024, CVE-2018-1000027.
- More information:
Squid, a high-performance proxy caching server for web clients, has been found vulnerable to denial of service attacks associated with ESI response processing and intermediate CA certificate downloading.
Incorrect pointer handling resulted in the ability of a remote server to return a crafted ESI response which could trigger a denial of service for all clients accessing the Squid service. This issue affects the Squid custom ESI parser.
Incorrect pointer handling resulted in the possibility of a remote client delivering certain HTTP requests in conjunction with certain trusted server reponses involving the processing of ESI responses or downloading of intermediate CA certificates to trigger a denial of service for all clients accessing the squid service.
For Debian 7
Wheezy, these problems have been fixed in version 3.1.20-2.2+deb7u8.
We recommend that you upgrade your squid3 packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS