First published: Tue Aug 24 2010(Updated: )
A buffer overread flaw was found in the way Squid proxy caching server processed large DNS replies in cases, when no IPv6 resolver was present. A remote attacker could provide DNS reply with large amount of data, leading to denial of service (squid server crash). Upstream bug report: [1] <a href="http://bugs.squid-cache.org/show_bug.cgi?id=3021">http://bugs.squid-cache.org/show_bug.cgi?id=3021</a> Relevant upstream changeset: [2] <a href="http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072">http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072</a> References: [3] <a href="http://marc.info/?l=squid-users&m=128263555724981&w=2">http://marc.info/?l=squid-users&m=128263555724981&w=2</a> [4] <a href="http://bugs.gentoo.org/show_bug.cgi?id=334263">http://bugs.gentoo.org/show_bug.cgi?id=334263</a> CVE Request: [5] <a href="http://www.openwall.com/lists/oss-security/2010/08/24/6">http://www.openwall.com/lists/oss-security/2010/08/24/6</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Squid-Cache Squid | =3.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.