[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3625-1 squid3 -- squid3

ID: oval:org.secpod.oval:def:602563Date: (C)2016-07-26   (M)2023-12-20
Class: PATCHFamily: unix




Several security issues have been discovered in the Squid caching proxy. CVE-2016-4051: CESG and Yuriy M. Kaminskiy discovered that Squid cachemgr.cgi was vulnerable to a buffer overflow when processing remotely supplied inputs relayed through Squid. CVE-2016-4052: CESG discovered that a buffer overflow made Squid vulnerable to a Denial of Service attack when processing ESI responses. CVE-2016-4053: CESG found that Squid was vulnerable to public information disclosure of the server stack layout when processing ESI responses. CVE-2016-4054: CESG discovered that Squid was vulnerable to remote code execution when processing ESI responses. CVE-2016-4554: Jianjun Chen found that Squid was vulnerable to a header smuggling attack that could lead to cache poisoning and to bypass of same-origin security policy in Squid and some client browsers. CVE-2016-4555, CVE-2016-4556: "bfek-18" and "@vftable" found that Squid was vulnerable to a Denial of Service attack when processing ESI responses, due to incorrect pointer handling and reference counting.

Platform:
Debian 8.x
Product:
squid3
Reference:
DSA-3625-1
CVE-2016-4051
CVE-2016-4052
CVE-2016-4053
CVE-2016-4054
CVE-2016-4554
CVE-2016-4555
CVE-2016-4556
CVE    7
CVE-2016-4051
CVE-2016-4556
CVE-2016-4555
CVE-2016-4554
...
CPE    2
cpe:/a:squid-cache:squid3
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies