Squid 3.5.x < 3.5.14 DoS

low Nessus Network Monitor Plugin ID 9773

Synopsis

The remote proxy server is affected by a Denial of Server (DoS) attack vector.

Description

Versions of Squid 3.5.x prior to 3.5.14 are affected by a flaw in the 'FwdState::connectedToPeer()' function in 'FwdState.cc' that is triggered as server connection errors are handled improperly. This may allow a remote attacker to cause a denial of service when connecting to TLS or SSL servers.

Solution

Either upgrade to Squid version 3.5.14 or later, or apply the vendor-supplied patch.

See Also

http://www.squid-cache.org/Advisories/SQUID-2016_1.txt

http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13981.patch

http://www.nessus.org/u?31eb3798

Plugin Details

Severity: Low

ID: 9773

Family: Web Servers

Published: 11/11/2016

Updated: 3/6/2019

Nessus ID: 89052

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2/16/2016

Vulnerability Publication Date: 2/16/2016

Reference Information

CVE: CVE-2016-2390

BID: 83261