Scientific Linux Security Update : squid on SL7.x x86_64

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Security Fix(es) :

- A buffer overflow flaw was found in the way the Squid
cachemgr.cgi utility processed remotely relayed Squid
input. When the CGI interface utility is used, a remote
attacker could possibly use this flaw to execute
arbitrary code. (CVE-2016-4051)

- Buffer overflow and input validation flaws were found in
the way Squid processed ESI responses. If Squid was used
as a reverse proxy, or for TLS/HTTPS interception, a
remote attacker able to control ESI components on an
HTTP server could use these flaws to crash Squid,
disclose parts of the stack memory, or possibly execute
arbitrary code as the user running Squid.
(CVE-2016-4052, CVE-2016-4053, CVE-2016-4054)

- An input validation flaw was found in the way Squid
handled intercepted HTTP Request messages. An attacker
could use this flaw to bypass the protection against
issues related to CVE-2009-0801, and perform cache
poisoning attacks on Squid. (CVE-2016-4553)

- An input validation flaw was found in Squid's
mime_get_header_field() function, which is used to
search for headers within HTTP requests. An attacker
could send an HTTP request from the client side with
specially crafted header Host header that bypasses
same-origin security protections, causing Squid
operating as interception or reverse-proxy to contact
the wrong origin server. It could also be used for cache
poisoning for client not following RFC 7230.
(CVE-2016-4554)

- A NULL pointer dereference flaw was found in the way
Squid processes ESI responses. If Squid was used as a
reverse proxy or for TLS/HTTPS interception, a malicious
server could use this flaw to crash the Squid worker
process. (CVE-2016-4555)

- An incorrect reference counting flaw was found in the
way Squid processes ESI responses. If Squid is
configured as reverse-proxy, for TLS/HTTPS interception,
an attacker controlling a server accessed by Squid,
could crash the squid worker, causing a Denial of
Service attack. (CVE-2016-4556)

See also :

http://www.nessus.org/u?a8e0e996

Solution :

Update the affected squid, squid-debuginfo and / or squid-sysvinit
packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 91513 ()

Bugtraq ID:

CVE ID: CVE-2009-0801
CVE-2016-4051
CVE-2016-4052
CVE-2016-4053
CVE-2016-4054
CVE-2016-4553
CVE-2016-4554
CVE-2016-4555
CVE-2016-4556

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now