Summary
Matthew Daley discovered that Squid3, a fully featured web proxy cache, did not properly perform input validation in request parsing. A remote attacker could use this flaw to mount a denial of service by sending crafted Range requests.
Solution
For the stable distribution (wheezy), this problem has been fixed in version 3.1.20-2.2+deb7u2.
For the unstable distribution (sid), this problem will be fixed soon.
We recommend that you upgrade your squid3 packages.
Insight
Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects.
Affected
squid3 on Debian Linux
Detection
This check tests the installed software version using the apt package manager.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-3609 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities