First published: Wed Aug 19 2009(Updated: )
A denial of service flaw was found in the way Squid used to process certain external ACL helper HTTP-Header fields (%{header:<delimiter>member}), where <delimiter> is not a comma. Remote attacker could use this flaw to cause an excessive CPU use by issuing such a request to the Squid server. Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2009-2855">CVE-2009-2855</a> to this vulnerability: ------------------------------------------------------------------------------ The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function. References: ----------- [1] <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855</a> [2] <a href="http://www.openwall.com/lists/oss-security/2009/07/20/10">http://www.openwall.com/lists/oss-security/2009/07/20/10</a> [3] <a href="http://www.openwall.com/lists/oss-security/2009/08/03/3">http://www.openwall.com/lists/oss-security/2009/08/03/3</a> [4] <a href="http://www.openwall.com/lists/oss-security/2009/08/04/6">http://www.openwall.com/lists/oss-security/2009/08/04/6</a> [5] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31;filename=diff;att=1;bug=534982">http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31;filename=diff;att=1;bug=534982</a> [6] <a href="http://www.squid-cache.org/bugs/show_bug.cgi?id=2704">http://www.squid-cache.org/bugs/show_bug.cgi?id=2704</a> [7] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534982">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534982</a> Note: The proposed patch from Debian [6] isn't the upstream one. Please wait, while upstream confirms it or comes with another one. Upstream bug report: -------------------- <a href="http://www.squid-cache.org/bugs/show_bug.cgi?id=2541">http://www.squid-cache.org/bugs/show_bug.cgi?id=2541</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-518182 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-518182, update your Squid software to the latest version that addresses this vulnerability.
REDHAT-BUG-518182 can lead to excessive CPU usage, potentially causing a denial of service on systems utilizing Squid.
Systems running versions of Squid that process external ACL helper HTTP-Header fields are affected by REDHAT-BUG-518182.
Monitor your Squid logs for unusual or excessive requests that may exploit the vulnerability described in REDHAT-BUG-518182.