VID |
22910 |
Severity |
30 |
Port |
8080,3128 |
Protocol |
TCP |
Class |
Webproxy |
Detailed Description |
According to its banner, the version of Squid running on the remote host is 3.x prior to 3.5.28. It is, therefore, affected by multiple vulnerabilities:
- A denial of service (DoS) vulnerability exists in the ESI response processing component due to incorrect pointer handling. A remote attacker controlled server can exploit this issue, via a crafted ESI response, to cause a denial of service for all clients accessing the Squid service (CVE-2018-1000024)
- A denial of service (DoS) vulnerability exists in the HTTP message processing component due to incorrect pointer handling. An unauthenticated remote attacker can exploit this issue, via a crafted HTTP request, to cause a denial of service for all clients accessing the Squid service (CVE-2018-1000027)
* References: http://www.squid-cache.org/Advisories/SQUID-2018_1.txt http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache versions prior to 3.5.28 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Squid (3.5.28 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v3/ |
Related URL |
CVE-2018-1000024,CVE-2018-1000027 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|