VID |
22651 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid is 3.3.x earlier than than 3.3.13. The flaw exists due to user-supplied input not being properly validated in request parsing. This allows a remote attacker to specially craft a request with Range headers with unidentifiable byte-range values to crash the application.
* Note: This check solely relied on the banner of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/SQUID-2014_2.txt
* Platforms Affected: Squid Web Proxy Cache versions 3.3.x prior to 3.3.13 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (3.3.13 or later), available from the Squid Web site at http://www.squid-cache.org/ |
Related URL |
CVE-2014-3609 (CVE) |
Related URL |
69453 (SecurityFocus) |
Related URL |
(ISS) |
|