First published: Mon Dec 17 2012(Updated: )
A denial of service flaw was found in the way the CGI Cache Manager of the Squid proxy caching server processed certain requests. A remote attacker could this this flaw to cause the squid service to consume excessive amount of resources. References: [1] <a href="http://www.squid-cache.org/Advisories/SQUID-2012_1.txt">http://www.squid-cache.org/Advisories/SQUID-2012_1.txt</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=447596">https://bugs.gentoo.org/show_bug.cgi?id=447596</a> [3] <a href="https://secunia.com/advisories/51545/">https://secunia.com/advisories/51545/</a> Upstream patches: [4] <a href="http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10479.patch">http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10479.patch</a> (against the 3.1 branch) [5] <a href="http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch">http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11714.patch</a> (against the 3.2 branch)
Affected Software | Affected Version | How to fix |
---|---|---|
Squid Web Proxy Cache | >3.1>3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-887962 is considered high, as it allows for potential denial of service due to resource exhaustion.
To fix REDHAT-BUG-887962, you should upgrade to a patched version of the Squid proxy caching server that addresses this vulnerability.
The impact of REDHAT-BUG-887962 is that a remote attacker can exploit this flaw to disrupt service by exhausting system resources.
Versions of Squid prior to 3.1 and 3.2 are affected by REDHAT-BUG-887962.
Yes, REDHAT-BUG-887962 can be exploited remotely, allowing attackers to send crafted requests to the Squid server.