VID |
22539 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.0.STABLE26 / 3.1.15 / 3.2.0.11. It reportedly contains a buffer overflow when parsing responses from Gopher servers that results in memory corruption and usually causes the Squid server itself to crash.
* Note: This check solely relied on the banner of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/SQUID-2011_3.txt
* Platforms Affected: Squid Web Proxy Cache versions 3.1.x prior to 3.1.15 Squid Web Proxy Cache versions 3.2.x prior to 3.2.0.11 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (3.0.STABLE26 / 3.1.15 / 3.2.0.11 or later), available from the Squid Web site at http://www.squid-cache.org/ |
Related URL |
CVE-2011-3205 (CVE) |
Related URL |
49356 (SecurityFocus) |
Related URL |
(ISS) |
|