FreeBSD : squid -- SSL/TLS processing remote DoS (56562efb-d5e4-11e5-b2bd-002590263bf5)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Squid security advisory 2016:1 reports :

Due to incorrectly handling server errors Squid is vulnerable to a
denial of service attack when connecting to TLS or SSL servers.

This problem allows any trusted client to perform a denial of service
attack on the Squid service regardless of whether TLS or SSL is
configured for use in the proxy.

Misconfigured client or server software may trigger this issue to
perform a denial of service unintentionally.

However, the bug is exploitable only if Squid is built using the
--with-openssl option.

The FreeBSD port does not use SSL by default and is not vulnerable in
the default configuration.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207294
http://www.squid-cache.org/Advisories/SQUID-2016_1.txt
http://www.nessus.org/u?d7ace1c3

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 88818 ()

Bugtraq ID:

CVE ID: CVE-2016-2390

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now