EulerOS 2.0 SP1 : squid (EulerOS-SA-2016-1056)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote EulerOS host is missing multiple security updates.

Description :

According to the versions of the squid packages installed, the
EulerOS installation on the remote host is affected by the following
vulnerabilities :

- Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not
properly append data to String objects, which allows
remote servers to cause a denial of service (assertion
failure and daemon exit) via a long string, as
demonstrated by a crafted HTTP Vary
header.(CVE-2016-2569)

- The Edge Side Includes (ESI) parser in Squid 3.x before
3.5.15 and 4.x before 4.0.7 does not check buffer
limits during XML parsing, which allows remote HTTP
servers to cause a denial of service (assertion failure
and daemon exit) via a crafted XML document, related to
esi/CustomParser.cc and
esi/CustomParser.h.(CVE-2016-2570)

- http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7
proceeds with the storage of certain data after a
response-parsing failure, which allows remote HTTP
servers to cause a denial of service (assertion failure
and daemon exit) via a malformed
response.(CVE-2016-2571)

- http.cc in Squid 4.x before 4.0.7 relies on the HTTP
status code after a response-parsing failure, which
allows remote HTTP servers to cause a denial of service
(assertion failure and daemon exit) via a malformed
response.(CVE-2016-2572)

- Squid 3.x before 3.5.16 and 4.x before 4.0.8 improperly
perform bounds checking, which allows remote attackers
to cause a denial of service via a crafted HTTP
response, related to Vary headers.(CVE-2016-3948)

Note that Tenable Network Security has extracted the preceding
description block directly from the EulerOS security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?4bfcaf5e

Solution :

Update the affected squid packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Huawei Local Security Checks

Nessus Plugin ID: 99818 ()

Bugtraq ID:

CVE ID: CVE-2016-2569
CVE-2016-2570
CVE-2016-2571
CVE-2016-2572
CVE-2016-3948

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now