Scientific Linux Security Update : squid on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

It was found that Squid configured with client-first SSL-bump did not
correctly validate X.509 server certificate host name fields. A
man-in- the-middle attacker could use this flaw to spoof a Squid
server using a specially crafted X.509 certificate. (CVE-2015-3455)

This update fixes the following bugs :

- Previously, the squid process did not handle file
descriptors correctly when receiving Simple Network
Management Protocol (SNMP) requests. As a consequence,
the process gradually accumulated open file descriptors.
This bug has been fixed and squid now handles SNMP
requests correctly, closing file descriptors when

- Under high system load, the squid process sometimes
terminated unexpectedly with a segmentation fault during
reboot. This update provides better memory handling
during reboot, thus fixing this bug.

After installing this update, the squid service will be restarted

See also :

Solution :

Update the affected squid, squid-debuginfo and / or squid-sysvinit

Risk factor :

Low / CVSS Base Score : 2.6

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87574 ()

Bugtraq ID:

CVE ID: CVE-2015-3455

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now