Executive Summary
Summary | |
---|---|
Title | squid security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2013:0505 | First vendor Publication | 2013-02-21 |
Vendor | RedHat | Last vendor Modification | 2013-02-21 |
Severity (Vendor) | Moderate | Revision | 02 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated squid packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 3. Description: Squid is a high-performance proxy caching server for web clients that supports FTP, Gopher, and HTTP data objects. A denial of service flaw was found in the way the Squid Cache Manager processed certain requests. A remote attacker who is able to access the Cache Manager CGI could use this flaw to cause Squid to consume an excessive amount of memory. (CVE-2012-5643) This update also fixes the following bugs: * Due to a bug in the ConnStateData::noteMoreBodySpaceAvailable() function, child processes of Squid terminated upon encountering a failed assertion. An upstream patch has been provided and Squid child processes no longer terminate. (BZ#805879) * Due to an upstream patch, which renamed the HTTP header controlling persistent connections from "Proxy-Connection" to "Connection", the NTLM pass-through authentication does not work, thus preventing login. This update adds the new "http10" option to the squid.conf file, which can be used to enable the change in the patch. This option is set to "off" by default. When set to "on", the NTLM pass-through authentication works properly, thus allowing login attempts to succeed. (BZ#844723) * When the IPv6 protocol was disabled and Squid tried to handle an HTTP GET request containing an IPv6 address, the Squid child process terminated due to signal |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2013-0505.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20726 | |||
Oval ID: | oval:org.mitre.oval:def:20726 | ||
Title: | RHSA-2013:0505: squid security and bug fix update (Moderate) | ||
Description: | Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0505-02 CESA-2013:0505 CVE-2012-5643 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 6 CentOS Linux 6 | Product(s): | squid |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23993 | |||
Oval ID: | oval:org.mitre.oval:def:23993 | ||
Title: | ELSA-2013:0505: squid security and bug fix update (Moderate) | ||
Description: | Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0505-02 CVE-2012-5643 | Version: | 6 |
Platform(s): | Oracle Linux 6 | Product(s): | squid |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27245 | |||
Oval ID: | oval:org.mitre.oval:def:27245 | ||
Title: | DEPRECATED: ELSA-2013-0505 -- squid security and bug fix update (moderate) | ||
Description: | [7:3.1.10-16] - Resolves: #888198 - CVE-2012-5643: improved upstream patch [7:3.1.10-15] - Reverts: #861062 - Squid delays on FQDNs that don't contains AAAA record [7:3.1.10-14] - Resolves: #888198 - CVE-2012-5643: patch [7:3.1.10-13] - Resolves: #888198 - CVE-2012-5643: DoS (excessive resource consumption) [7:3.1.10-12] - Resolves #861062 - add configure directive --enable-internal-dns [7:3.1.10-11 ] - Resolves #861062 - Squid delays on FQDNs that don't contains AAAA record [7:3.1.10-10] - Resolves #798090 - Client timeout uses server-side 'read_timeout' - Resolves #833086 - Private md5 hash function does not comply FIPS - Resolves #782732 - Squid crashes by segfault when it reboots - Resolves #797571 - Squid userid is not added to wbpriv group - Disable strict-error-checking on account of squid-fips.patch | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013-0505 CVE-2012-5643 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | squid |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-12-26 | Name : Fedora Update for squid FEDORA-2012-20537 File : nvt/gb_fedora_2012_20537_squid_fc16.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-12-03 | Squid HTTP Proxy cachemgr.cgi denial of service attempt RuleID : 52067 - Revision : 1 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-09-02 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-2089-1.nasl - Type : ACT_GATHER_INFO |
2016-09-02 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2016-1996-1.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_squid_20130618.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-698.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-43.nasl - Type : ACT_GATHER_INFO |
2013-09-28 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-22.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2013-0505.nasl - Type : ACT_GATHER_INFO |
2013-04-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-129.nasl - Type : ACT_GATHER_INFO |
2013-03-10 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2013-0505.nasl - Type : ACT_GATHER_INFO |
2013-03-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130221_squid_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2013-02-26 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_squid3-130212.nasl - Type : ACT_GATHER_INFO |
2013-02-25 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2631.nasl - Type : ACT_GATHER_INFO |
2013-02-24 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_squid-130212.nasl - Type : ACT_GATHER_INFO |
2013-02-23 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_squid-8464.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0505.nasl - Type : ACT_GATHER_INFO |
2013-02-21 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-013.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1625.nasl - Type : ACT_GATHER_INFO |
2013-02-10 | Name : The remote Fedora host is missing a security update. File : fedora_2013-1616.nasl - Type : ACT_GATHER_INFO |
2013-02-08 | Name : The remote proxy server is affected by a denial of service vulnerability. File : squid_3_2_6.nasl - Type : ACT_GATHER_INFO |
2013-01-31 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1713-1.nasl - Type : ACT_GATHER_INFO |
2012-12-31 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_c37de843488e11e2a5c90019996bc1f7.nasl - Type : ACT_GATHER_INFO |
2012-12-27 | Name : The remote Fedora host is missing a security update. File : fedora_2012-20537.nasl - Type : ACT_GATHER_INFO |
2012-12-20 | Name : The remote proxy server is affected by a denial of service vulnerability. File : squid_3_2_3.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:56:50 |
|
2013-02-21 09:18:55 |
|