Squid < 2.7.STABLE6 / 3.x < 3.0.STABLE13 / 3.1.x < 3.1.0.5 DoS

Medium Nessus Network Monitor Plugin ID 4923

Synopsis

The remote proxy server is susceptible to a Denial of Service (DoS) attack.

Description

The version of the Squid proxy caching server installed on the remote host may abort when parsing requests with an invalid HTTP version. A remote attacker may be able to leverage this issue to crash the application, thereby denying service to legitimate users.

Note that successful exploitation of this issue requires that Squid was not built with the 'NODEBUG' define.

Solution

Either apply the appropriate patches referenced in the project's advisory above or upgrade to version 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 or higher.

See Also

http://www.squid-cache.org/Advisories/SQUID-2009_1.txt

http://www.securityfocus.com/archive/1/500653/30/0/threaded

Plugin Details

Severity: Medium

ID: 4923

File Name: 4923.prm

Family: Web Servers

Published: 2009/02/09

Modified: 2016/01/21

Dependencies: 3389

Nessus ID: 35620

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2009/02/02

Vulnerability Publication Date: 2009/02/02

Reference Information

CVE: CVE-2009-0478

BID: 33604