SB2016042003 - Input validation error in Squid-cache Squid
Published: April 20, 2016 Updated: August 9, 2020
Security Bulletin ID
SB2016042003
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2016-2390)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The FwdState::connectedToPeer method in FwdState.cc in Squid before 3.5.14 and 4.0.x before 4.0.6 does not properly handle SSL handshake errors when built with the --with-openssl option, which allows remote attackers to cause a denial of service (application crash) via a plaintext HTTP message.
Remediation
Install update from vendor's website.
References
- http://bugs.squid-cache.org/show_bug.cgi?id=4437
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000037.html
- http://lists.squid-cache.org/pipermail/squid-announce/2016-February/000038.html
- http://www.securitytracker.com/id/1035045
- http://www.squid-cache.org/Advisories/SQUID-2016_1.txt