First published: Tue May 10 2016(Updated: )
Due to incorrect reference counting Squid is vulnerable to a denial of service attack when processing ESI responses. External references: <a href="http://www.squid-cache.org/Advisories/SQUID-2016_9.txt">http://www.squid-cache.org/Advisories/SQUID-2016_9.txt</a> Upstream fixes: Squid 3.5: <a href="http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch">http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch</a> Squid 3.4: <a href="http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch">http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch</a> NOTE: For the other related CVE, <a href="https://access.redhat.com/security/cve/CVE-2016-4555">CVE-2016-4555</a>, see <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED ERRATA - CVE-2016-4555 squid: SegFault from ESIInclude::Start" href="show_bug.cgi?id=1334246">Bug 1334246</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | >=3.4>=3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-1334786 has a high severity due to its potential to cause a denial of service attack.
To fix REDHAT-BUG-1334786, update to Squid version 3.5 or later.
REDHAT-BUG-1334786 affects Squid versions 3.4 and 3.5.
REDHAT-BUG-1334786 is a denial of service vulnerability due to incorrect reference counting.
More information about REDHAT-BUG-1334786 can be found in the Squid advisory.