SB2016051019 - Input validation error in Squid-cache Squid
Published: May 10, 2016 Updated: July 28, 2020
Security Bulletin ID
SB2016051019
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2016-4556)
The vulnerability allows remote servers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
Remediation
Install update from vendor's website.
References
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00069.html
- http://www.debian.org/security/2016/dsa-3625
- http://www.openwall.com/lists/oss-security/2016/05/06/3
- http://www.openwall.com/lists/oss-security/2016/05/06/5
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securitytracker.com/id/1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.ubuntu.com/usn/USN-2995-1
- https://access.redhat.com/errata/RHSA-2016:1138
- https://access.redhat.com/errata/RHSA-2016:1139
- https://access.redhat.com/errata/RHSA-2016:1140
- https://security.gentoo.org/glsa/201607-01