Squid 3.5.x < 3.5.14 DoS

Medium Nessus Network Monitor Plugin ID 9773

Synopsis

The remote proxy server is affected by a Denial of Server (DoS) attack vector.

Description

Versions of Squid 3.5.x prior to 3.5.14 are affected by a flaw in the 'FwdState::connectedToPeer()' function in 'FwdState.cc' that is triggered as server connection errors are handled improperly. This may allow a remote attacker to cause a denial of service when connecting to TLS or SSL servers.

Solution

Either upgrade to Squid version 3.5.14 or later, or apply the vendor-supplied patch.

See Also

http://www.squid-cache.org/Advisories/SQUID-2016_1.txt

http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13981.patch

http://www.nessus.org/u?31eb3798

Plugin Details

Severity: Medium

ID: 9773

Family: Web Servers

Published: 2016/11/11

Updated: 2019/03/06

Dependencies: 3389

Nessus ID: 89052

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 3.6

Temporal Score: 3.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2016/02/16

Vulnerability Publication Date: 2016/02/16

Reference Information

CVE: CVE-2016-2390

BID: 83261