FreeBSD : squid -- remote DoS in HTTP response processing (660ebbf5-daeb-11e5-b2bd-002590263bf5)

Medium Nessus Plugin ID 88944


The remote FreeBSD host is missing a security-related update.


Squid security advisory 2016:2 reports :

Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses.

These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.

HTTP responses containing malformed headers that trigger this issue are becoming common. We are not certain at this time if that is a sign of malware or just broken server scripting.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 88944

File Name: freebsd_pkg_660ebbf5daeb11e5b2bd002590263bf5.nasl

Version: $Revision: 2.4 $

Type: local

Published: 2016/02/25

Modified: 2016/10/19

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P


Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:squid, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2016/02/24

Vulnerability Publication Date: 2016/02/24

Reference Information

CVE: CVE-2016-2569, CVE-2016-2570, CVE-2016-2571