RHEL 6 : squid (RHSA-2011:1293)

medium Nessus Plugin ID 56205

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

An updated squid package that fixes one security issue is now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

A buffer overflow flaw was found in the way Squid parsed replies from remote Gopher servers. A remote user allowed to send Gopher requests to a Squid proxy could possibly use this flaw to cause the squid child process to crash or execute arbitrary code with the privileges of the squid user, by making Squid perform a request to an attacker-controlled Gopher server. (CVE-2011-3205)

Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.

Solution

Update the affected squid and / or squid-debuginfo packages.

See Also

https://access.redhat.com/security/cve/cve-2011-3205

https://access.redhat.com/errata/RHSA-2011:1293

Plugin Details

Severity: Medium

ID: 56205

File Name: redhat-RHSA-2011-1293.nasl

Version: 1.18

Type: local

Agent: unix

Published: 9/15/2011

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:squid, p-cpe:/a:redhat:enterprise_linux:squid-debuginfo, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/14/2011

Vulnerability Publication Date: 9/6/2011

Reference Information

CVE: CVE-2011-3205

BID: 49356

RHSA: 2011:1293