Squid < 2.7.STABLE6 / 3.x < 3.0.STABLE13 / 3.1.x < 3.1.0.5 DoS

medium Nessus Network Monitor Plugin ID 4923

Synopsis

The remote proxy server is susceptible to a Denial of Service (DoS) attack.

Description

The version of the Squid proxy caching server installed on the remote host may abort when parsing requests with an invalid HTTP version. A remote attacker may be able to leverage this issue to crash the application, thereby denying service to legitimate users.

Note that successful exploitation of this issue requires that Squid was not built with the 'NODEBUG' define.

Solution

Either apply the appropriate patches referenced in the project's advisory above or upgrade to version 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 or higher.

See Also

http://www.squid-cache.org/Advisories/SQUID-2009_1.txt

http://www.securityfocus.com/archive/1/500653/30/0/threaded

Plugin Details

Severity: Medium

ID: 4923

Family: Web Servers

Published: 2/9/2009

Updated: 3/6/2019

Nessus ID: 35620

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2/2/2009

Vulnerability Publication Date: 2/2/2009

Reference Information

CVE: CVE-2009-0478

BID: 33604