First published: Fri Nov 06 2015(Updated: )
Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | =3.4.4 | |
Squid Web Proxy Cache | =3.4.5 | |
Squid Web Proxy Cache | =3.4.6 | |
Squid Web Proxy Cache | =3.4.7 | |
Squid Web Proxy Cache | =3.4.8 | |
Squid Web Proxy Cache | =3.4.9 | |
Squid Web Proxy Cache | =3.4.10 | |
Squid Web Proxy Cache | =3.4.11 | |
Squid Web Proxy Cache | =3.4.12 | |
Squid Web Proxy Cache | =3.4.13 | |
Squid Web Proxy Cache | =3.5.0.1 | |
Squid Web Proxy Cache | =3.5.0.2 | |
Squid Web Proxy Cache | =3.5.0.3 | |
Squid Web Proxy Cache | =3.5.0.4 | |
Squid Web Proxy Cache | =3.5.1 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9749 has a medium severity rating due to the potential for unauthorized access through nonce replay.
To fix CVE-2014-9749, upgrade to versions 3.4.12 or later, or 3.5.2 or later of Squid.
CVE-2014-9749 represents a nonce replay attack which allows authenticated users to reuse stale nonces, potentially leading to unauthorized access.
CVE-2014-9749 affects Squid versions 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1.
Yes, CVE-2014-9749 is exploitable remotely by authenticated users leveraging a stale nonce.