VID |
22673 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
The relevant host is running a version of Squid caching proxy which is older than 3.5.4. Squid is a freely available Web Proxy server for Linux and Unix distributions. Squid Web Proxy Cache versions prior to 3.5.4 are affected by a flaw related to certificate validation due to the server hostname not being verified as matching a the domain name in the certificate Subject's Common Name (CN) or the SubjectAltName fields. A man-in-the-middle attacker, using a crafted certificate, can utilize this to spoof a TLS/SSL server, thus allowing the disclosure or manipulation of intercepted data. Note that this flaw is exploitable only if Squid is configured to perform SSL Bumping with the 'client-first' or 'bump' mode of operation.
* Note: This check solely relied on the version number of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/ http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache versions prior to 3.5.4 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (3.5.4 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v3/3.5/ |
Related URL |
CVE-2015-3455 (CVE) |
Related URL |
74438 (SecurityFocus) |
Related URL |
(ISS) |
|