SUSE SLES11 Security Update : squid3 (SUSE-SU-2016:2089-1)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

This update for squid3 fixes the following issues :

- Multiple issues in pinger ICMP processing.
(CVE-2014-7141, CVE-2014-7142)

- CVE-2016-3947: Buffer overrun issue in pinger ICMPv6
processing. (bsc#973782)

- CVE-2016-4554: fix header smuggling issue in HTTP
Request processing (bsc#979010)

- Fix multiple Denial of Service issues in HTTP Response
processing. (CVE-2016-2569, CVE-2016-2570,
CVE-2016-2571, CVE-2016-2572, bsc#968392, bsc#968393,
bsc#968394, bsc#968395)

- Regression caused by the DoS fixes above (bsc#993299)

- CVE-2016-3948: Fix denial of service in HTTP Response
processing (bsc#973783)

- CVE-2016-4051: fixes buffer overflow in cachemgr.cgi
(bsc#976553)

- CVE-2016-4052, CVE-2016-4053, CVE-2016-4054 :

- fixes multiple issues in ESI processing (bsc#976556)

- CVE-2016-4556: fixes double free vulnerability in Esi.cc
(bsc#979008)

- CVE-2015-5400: Improper Protection of Alternate Path
(bsc#938715)

- CVE-2014-6270: fix off-by-one in snmp subsystem
(bsc#895773)

- Memory leak in squid3 when using external_acl
(bsc#976708)

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.suse.com/895773
https://bugzilla.suse.com/902197
https://bugzilla.suse.com/938715
https://bugzilla.suse.com/963539
https://bugzilla.suse.com/967011
https://bugzilla.suse.com/968392
https://bugzilla.suse.com/968393
https://bugzilla.suse.com/968394
https://bugzilla.suse.com/968395
https://bugzilla.suse.com/973782
https://bugzilla.suse.com/973783
https://bugzilla.suse.com/976553
https://bugzilla.suse.com/976556
https://bugzilla.suse.com/976708
https://bugzilla.suse.com/979008
https://bugzilla.suse.com/979009
https://bugzilla.suse.com/979010
https://bugzilla.suse.com/979011
https://bugzilla.suse.com/993299
https://www.suse.com/security/cve/CVE-2011-3205.html
https://www.suse.com/security/cve/CVE-2011-4096.html
https://www.suse.com/security/cve/CVE-2012-5643.html
https://www.suse.com/security/cve/CVE-2013-0188.html
https://www.suse.com/security/cve/CVE-2013-4115.html
https://www.suse.com/security/cve/CVE-2014-0128.html
https://www.suse.com/security/cve/CVE-2014-6270.html
https://www.suse.com/security/cve/CVE-2014-7141.html
https://www.suse.com/security/cve/CVE-2014-7142.html
https://www.suse.com/security/cve/CVE-2015-5400.html
https://www.suse.com/security/cve/CVE-2016-2390.html
https://www.suse.com/security/cve/CVE-2016-2569.html
https://www.suse.com/security/cve/CVE-2016-2570.html
https://www.suse.com/security/cve/CVE-2016-2571.html
https://www.suse.com/security/cve/CVE-2016-2572.html
https://www.suse.com/security/cve/CVE-2016-3947.html
https://www.suse.com/security/cve/CVE-2016-3948.html
https://www.suse.com/security/cve/CVE-2016-4051.html
https://www.suse.com/security/cve/CVE-2016-4052.html
https://www.suse.com/security/cve/CVE-2016-4053.html
https://www.suse.com/security/cve/CVE-2016-4054.html
https://www.suse.com/security/cve/CVE-2016-4553.html
https://www.suse.com/security/cve/CVE-2016-4554.html
https://www.suse.com/security/cve/CVE-2016-4555.html
https://www.suse.com/security/cve/CVE-2016-4556.html
http://www.nessus.org/u?514d1a19

Solution :

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product :

SUSE Linux Enterprise Server 11-SP4:zypper in -t patch
slessp4-squid3-12701=1

SUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch
dbgsp4-squid3-12701=1

To bring your system up-to-date, use 'zypper patch'.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false