Squid < 2.5.STABLE8 DoS
Medium Nessus Network Monitor Plugin ID 2520
SynopsisThe remote proxy server is vulnerable to a Denial of Service (DoS) attack.
DescriptionThe remote Squid caching proxy, according to its version number, may be vulnerable to a remote denial of service.
This flaw is caused due to an input validation error in the NTLM module.
An attacker can exploit this flaw to crash the server with a specially crafted packet.
The remote Squid proxy is also vulnerable to a cache-corruption flaw due to incorrect parsing of malformed HTTP headers. An attacker exploiting this flaw would be able to poison the cache.
The remote Squid proxy is vulnerable to an authentication bypass
in the squid_ldap_auth module as well as a remote overflow due to oversized HTTP headers.
SolutionUpgrade to Squid 2.5.STABLE8 or higher.