VID |
22739 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid running on the remote host is 4.x prior to 4.0.10. It is, therefore, vulnerable to a denial of service attack when processing ESI responses. This problem allows a remote server delivering certain ESI response syntax to trigger a denial of service for all clients accessing the Squid service.
* Note: This check solely relied on the version number of the remote Squid Web Proxy Cache server to assess this vulnerability, so this might be a false positive.
* References: http://www.squid-cache.org/Advisories/ http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache versions prior to 4.0.10 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (4.0.10 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v4/ |
Related URL |
CVE-2016-4555 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|