icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Squid Proxy < 2.5.STABLE8 Multiple Vulnerabilities

Low

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote Squid caching proxy, according to its version number, may be vulnerable to a remote denial of service.

This flaw is caused due to an input validation error in the NTLM module.

An attacker can exploit this flaw to crash the server with a specially crafted packet.

The remote Squid proxy is also vulnerable to a cache-corruption flaw due to incorrect parsing of malformed HTTP headers. An attacker exploiting this flaw would be able to poison the cache.

The remote Squid proxy is vulnerable to an authentication bypass in the squid_ldap_auth module as well as a remote overflow due to oversized HTTP headers.

Solution

Upgrade to Squid 2.5.STABLE8 or higher.