VID |
22725 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.5.17. It is, therefore, affected by multiple vulnerabilities :
- An assertion fault exists in file esi/Esi.cc that is triggered when handling ESI responses. An unauthenticated, remote attacker can exploit this, via an HTTP server that uses specially crafted Edge Side Includes (ESI), to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-4052)
- A flaw exists in file esi/Esi.cc due to improper validation of user-supplied input when handling ESI responses. An unauthenticated, remote attacker can exploit this, via specially crafted ESI responses, to disclose sensitive stack layout information. (CVE-2016-4053)
- A buffer overflow condition exists in file esi/Esi.cc due to improper validation of user-supplied input when handling ESI responses. An unauthenticated, remote attacker can exploit this, via specially crafted ESI responses, to cause a denial of service condition or the execution of arbitrary code. (CVE-2016-4054)
* Note: This check solely relied on the version number of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/ http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache versions prior to 3.5.17 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (3.5.17 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v3/3.5/ |
Related URL |
CVE-2016-4052,CVE-2016-4053,CVE-2016-4054 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|