| VID |
22539 |
| Severity |
30 |
| Port |
8080,3128 |
| Protocol |
TCP |
| Class |
Webproxy |
| Detailed Description |
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.0.STABLE26 / 3.1.15 / 3.2.0.11. It reportedly contains a buffer overflow when parsing responses from Gopher servers that results in memory corruption and usually causes the Squid server itself to crash.
* Note: This check solely relied on the banner of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/SQUID-2011_3.txt
* Platforms Affected: Squid Web Proxy Cache versions 3.1.x prior to 3.1.15 Squid Web Proxy Cache versions 3.2.x prior to 3.2.0.11 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Squid (3.0.STABLE26 / 3.1.15 / 3.2.0.11 or later), available from the Squid Web site at http://www.squid-cache.org/ |
| Related URL |
CVE-2011-3205 (CVE) |
| Related URL |
49356 (SecurityFocus) |
| Related URL |
(ISS) |
|