FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-23 14:57:51 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
064225c5-1f53-11d9-836a-0090962cff2asquid -- NTLM authentication denial-of-service vulnerability

A remote attacker is able to cause a denial-of-service situation, when NTLM authentication is enabled in squid. NTLM authentication uses two functions which lack correct offset checking.


Discovery 2004-08-18
Entry 2004-10-18
squid
< 2.5.7

CVE-2004-0832
http://www.squid-cache.org/bugs/show_bug.cgi?id=1045
0c0dc409-1c5e-11da-92ce-0048543d60cesquid -- Possible Denial Of Service Vulnerability in store.c

The squid patches page notes:

Squid crashes with the above assertion failure [assertion failed: store.c:523: "e->store_status == STORE_PENDING"] in certain conditions involving aborted requests.


Discovery 2005-08-02
Entry 2005-09-04
Modified 2005-10-02
squid
< 2.5.10_5

14761
CVE-2005-2794
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING
http://www.squid-cache.org/bugs/show_bug.cgi?id=1368
http://secunia.com/advisories/16708/
150d1538-23fa-11e5-a4a5-002590263bf5squid -- Improper Protection of Alternate Path with CONNECT requests

Squid security advisory 2015:2 reports:

Squid configured with cache_peer and operating on explicit proxy traffic does not correctly handle CONNECT method peer responses.

The bug is important because it allows remote clients to bypass security in an explicit gateway proxy.

However, the bug is exploitable only if you have configured cache_peer to receive CONNECT requests.


Discovery 2015-07-06
Entry 2015-07-06
Modified 2015-07-17
squid
< 3.5.6

http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
CVE-2015-5400
184ab9e0-64cd-11d9-9e1e-c296ac722cb3squid -- buffer overflow vulnerability in gopherToHTML

The squid patches page notes:

A malicious gopher server may return a response with very long lines that cause a buffer overflow in Squid.

Workaround: Since gopher is very obscure these days, do not allow Squid to any gopher servers. Use an ACL rule like:

acl Gopher proto gopher
http_access deny Gopher

Discovery 2005-01-11
Entry 2005-01-12
Modified 2005-01-22
squid
< 2.5.7_6

CVE-2005-0094
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-gopher_html_parsing
http://www.squid-cache.org/bugs/show_bug.cgi?id=1189
http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
1c3142a3-4ab2-11da-932d-00055d790c25squid -- FTP server response handling denial of service

A Secunia Advisory reports:

M.A.Young has reported a vulnerability in Squid, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error in handling certain FTP server responses. This can be exploited to crash Squid by visiting a malicious FTP server via the proxy.


Discovery 2005-10-19
Entry 2005-11-01
squid
< 2.5.11_3

CVE-2005-3258
http://secunia.com/advisories/17271/
23fb5a04-722b-11d9-9e1e-c296ac722cb3squid -- buffer overflow in WCCP recvfrom() call

According to the Squid Proxy Cache Security Update Advisory SQUID-2005:3,

The WCCP recvfrom() call accepts more data than will fit in the allocated buffer. An attacker may send a larger-than-normal WCCP message to Squid and overflow this buffer.

Severity:

The bug is important because it allows remote attackers to crash Squid, causing a disription in service. However, the bug is exploitable only if you have configured Squid to send WCCP messages to, and expect WCCP replies from, a router.

Sites that do not use WCCP are not vulnerable.

Note that while the default configuration of the FreeBSD squid port enables WCCP support in general, the default configuration supplied does not actually configure squid to send and receive WCCP messages.


Discovery 2005-01-28
Entry 2005-01-28
Modified 2005-02-13
squid
< 2.5.7_10

CVE-2005-0211
886006
http://www.squid-cache.org/Advisories/SQUID-2005_3.txt
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow
http://www.squid-cache.org/bugs/show_bug.cgi?id=1217
25e5205b-1447-11e6-9ead-6805ca0b3d42squid -- multiple vulnerabilities

The squid development team reports:

Please reference CVE/URL list for details


Discovery 2016-05-06
Entry 2016-05-07
Modified 2016-05-09
squid
ge 3.0.0 lt 3.5.18

squid-devel
ge 4.0.0 lt 4.0.10

CVE-2016-4553
CVE-2016-4554
CVE-2016-4555
CVE-2016-4556
http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
296ecb59-0f6b-11df-8bab-0019996bc1f7squid -- Denial of Service vulnerability in DNS handling

Squid security advisory 2010:1 reports:

Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted DNS packets.

This problem allows any trusted client or external server who can determine the squid receiving port to perform a short-term denial of service attack on the Squid service.


Discovery 2010-01-14
Entry 2010-02-01
Modified 2010-05-02
squid
ge 2.7.1 lt 2.7.7_3

ge 3.0.1 lt 3.0.23

ge 3.1.0.1 lt 3.1.0.15_2

CVE-2010-0308
http://www.squid-cache.org/Advisories/SQUID-2010_1.txt
297117ba-f92d-11e5-92ce-002590263bf5squid -- multiple vulnerabilities

Squid security advisory 2016:3 reports:

Due to a buffer overrun Squid pinger binary is vulnerable to denial of service or information leak attack when processing ICMPv6 packets.

This bug also permits the server response to manipulate other ICMP and ICMPv6 queries processing to cause information leak.

This bug allows any remote server to perform a denial of service attack on the Squid service by crashing the pinger. This may affect Squid HTTP routing decisions. In some configurations, sub-optimal routing decisions may result in serious service degradation or even transaction failures.

If the system does not contain buffer-overrun protection leading to that crash this bug will instead allow attackers to leak arbitrary amounts of information from the heap into Squid log files. This is of higher importance than usual because the pinger process operates with root priviliges.

Squid security advisory 2016:4 reports:

Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses.

This problem allows a malicious client script and remote server delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.


Discovery 2016-03-28
Entry 2016-04-02
squid
< 3.5.16

CVE-2016-3947
CVE-2016-3948
ports/208463
http://www.squid-cache.org/Advisories/SQUID-2016_3.txt
http://www.squid-cache.org/Advisories/SQUID-2016_4.txt
30a04ab4-ed7b-11e2-8643-8c705af55518squid -- denial of service

Squid project reports:

Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted HTTP requests

This problem allows any client who can generate HTTP requests to perform a denial of service attack on the Squid service.


Discovery 2013-07-13
Entry 2013-07-15
squid
ge 3.2 lt 3.2.12

ge 3.3 lt 3.3.8

CVE-2013-4123
http://www.squid-cache.org/Advisories/SQUID-2013_3.txt
41f8af15-c8b9-11e6-ae1b-002590263bf5squid -- multiple vulnerabilities

Squid security advisory 2016:10 reports:

Due to incorrect comparison of request headers Squid can deliver responses containing private data to clients it should not have reached.

This problem allows a remote attacker to discover private and sensitive information about another clients browsing session. Potentially including credentials which allow access to further sensitive resources. This problem only affects Squid configured to use the Collapsed Forwarding feature. It is of particular importance for HTTPS reverse-proxy sites with Collapsed Forwarding.

Squid security advisory 2016:11 reports:

Due to incorrect HTTP conditional request handling Squid can deliver responses containing private data to clients it should not have reached.

This problem allows a remote attacker to discover private and sensitive information about another clients browsing session. Potentially including credentials which allow access to further sensitive resources..


Discovery 2016-12-16
Entry 2016-12-23
squid
ge 3.1 lt 3.5.23

squid-devel
ge 4.0 lt 4.0.17

CVE-2016-10002
CVE-2016-10003
ports/215416
ports/215418
http://www.squid-cache.org/Advisories/SQUID-2016_10.txt
http://www.squid-cache.org/Advisories/SQUID-2016_11.txt
44e7764c-2614-11da-9e1e-c296ac722cb3squid -- possible denial of service condition regarding NTLM authentication

The squid patches page notes:

Squid may crash with the above error [FATAL: Incorrect scheme in auth header] when given certain request sentences.

Workaround: disable NTLM authentication.


Discovery 2005-09-12
Entry 2005-09-15
Modified 2005-10-02
squid
< 2.5.10_6

14977
CVE-2005-2917
http://www.squid-cache.org/bugs/show_bug.cgi?id=1391
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-NTLM-scheme_assert
http://secunia.com/advisories/16992/
4e210d72-1c5c-11da-92ce-0048543d60cesquid -- Denial Of Service Vulnerability in sslConnectTimeout

The squid patches page notes:

After certain slightly odd requests Squid crashes with a segmentation fault in sslConnectTimeout.


Discovery 2005-07-21
Entry 2005-09-04
Modified 2005-10-02
squid
< 2.5.10_5

14731
CVE-2005-2796
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-sslConnectTimeout
http://www.squid-cache.org/bugs/show_bug.cgi?id=1355
http://secunia.com/advisories/16674/
4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3squid -- HTTP response splitting cache pollution attack

According to a whitepaper published by Sanctum, Inc., it is possible to mount cache poisoning attacks against, among others, squid proxies by inserting false replies into the HTTP stream.

The squid patches page notes:

This patch additionally strengthens Squid from the HTTP response attack described by Sanctum.


Discovery 2004-03-01
Entry 2005-01-22
Modified 2005-02-07
squid
< 2.5.7_8

CVE-2005-0175
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting
http://www.squid-cache.org/bugs/show_bug.cgi?id=1200
https://www.watchfire.com/securearea/whitepapers.aspx?id=8
625878
56562efb-d5e4-11e5-b2bd-002590263bf5squid -- SSL/TLS processing remote DoS

Squid security advisory 2016:1 reports:

Due to incorrectly handling server errors Squid is vulnerable to a denial of service attack when connecting to TLS or SSL servers.

This problem allows any trusted client to perform a denial of service attack on the Squid service regardless of whether TLS or SSL is configured for use in the proxy.

Misconfigured client or server software may trigger this issue to perform a denial of service unintentionally.

However, the bug is exploitable only if Squid is built using the --with-openssl option.

The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.


Discovery 2016-02-16
Entry 2016-02-18
squid
ge 3.5.13 lt 3.5.14

CVE-2016-2390
ports/207294
http://www.squid-cache.org/Advisories/SQUID-2016_1.txt
57c1c2ee-7914-11ea-90bf-0800276545c1Squid -- multiple vulnerabilities

The Squid developers reports:

Improper Input Validation issues in HTTP Request processing (CVE-2020-8449, CVE-2020-8450).

Information Disclosure issue in FTP Gateway (CVE-2019-12528).

Buffer Overflow issue in ext_lm_group_acl helper (CVE-2020-8517).


Discovery 2020-02-10
Entry 2020-04-07
squid
< 4.10

http://lists.squid-cache.org/pipermail/squid-announce/2020-February/000107.html
https://nvd.nist.gov/vuln/detail/CVE-2020-8449
https://nvd.nist.gov/vuln/detail/CVE-2020-8450
https://nvd.nist.gov/vuln/detail/CVE-2019-12528
https://nvd.nist.gov/vuln/detail/CVE-2020-8517
CVE-2020-8449
CVE-2020-8450
CVE-2019-12528
CVE-2020-8517
ports/244026
5bf1a715-cc57-440f-b0a5-6406961c54a7squid -- denial-of-service vulnerabilities

The Squid team reported several denial-of-service vulnerabilities related to the handling of DNS responses and NT Lan Manager messages. These may allow an attacker to crash the Squid cache.


Discovery 2005-01-16
Entry 2005-06-03
squid
< 2.5.9

CVE-2005-0446
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE8-dns_assert
CVE-2005-0096
CVE-2005-0097
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_auth
5fe7e27a-64cb-11d9-9e1e-c296ac722cb3squid -- denial of service with forged WCCP messages

The squid patches page notes:

WCCP_I_SEE_YOU messages contain a 'number of caches' field which should be between 1 and 32. Values outside that range may crash Squid if WCCP is enabled, and if an attacker can spoof UDP packets with the WCCP router's IP address.


Discovery 2005-01-07
Entry 2005-01-12
Modified 2005-01-22
squid
< 2.5.7_6

CVE-2005-0095
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_denial_of_service
http://www.squid-cache.org/bugs/show_bug.cgi?id=1190
http://www.squid-cache.org/Advisories/SQUID-2005_2.txt
620685d6-0aa3-11ea-9673-4c72b94353b5squid -- Vulnerable to HTTP Digest Authentication

Squid Team reports:

Problem Description: Due to incorrect data management Squid is vulnerable to a information disclosure when processing HTTP Digest Authentication.

Severity: Nonce tokens contain the raw byte value of a pointer which sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.


Discovery 2019-11-05
Entry 2019-11-19
squid
< 4.9

http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679
CVE-2019-18679
65e99f52-1c5f-11d9-bc4a-000c41e2cdadsquid -- SNMP module denial-of-service vulnerability

The Squid-2.5 patches page notes:

If a certain malformed SNMP request is received squid restarts with a Segmentation Fault error.

This only affects squid installations where SNMP is explicitly enabled via "make config". As a workaround, SNMP can be disabled by defining "snmp_port 0" in squid.conf.

Squid security advisory SQUID-2008:1 explains that Squid-3 versions up to and including Squid-3.0.STABLE6 are affected by this error, too.


Discovery 2004-09-29
Entry 2004-10-12
Modified 2008-06-28
squid
< 2.5.7

ge 3.0.0 lt 3.0.7

CVE-2004-0918
http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE6-SNMP_core_dump
http://www.squid-cache.org/Advisories/SQUID-2004_3.txt
http://www.squid-cache.org/Advisories/SQUID-2008_1.txt
660ebbf5-daeb-11e5-b2bd-002590263bf5squid -- remote DoS in HTTP response processing

Squid security advisory 2016:2 reports:

Due to incorrect bounds checking Squid is vulnerable to a denial of service attack when processing HTTP responses.

These problems allow remote servers delivering certain unusual HTTP response syntax to trigger a denial of service for all clients accessing the Squid service.

HTTP responses containing malformed headers that trigger this issue are becoming common. We are not certain at this time if that is a sign of malware or just broken server scripting.


Discovery 2016-02-24
Entry 2016-02-24
Modified 2016-02-28
squid
< 3.5.15

CVE-2016-2569
CVE-2016-2570
CVE-2016-2571
ports/207454
http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
http://www.openwall.com/lists/oss-security/2016/02/24/12
6eb580d7-a29c-11dc-8919-001c2514716cSquid -- Denial of Service Vulnerability

Squid secuirty advisory reports:

Due to incorrect bounds checking Squid is vulnerable to a denial of service check during some cache update reply processing.

This problem allows any client trusted to use the service to perform a denial of service attack on the Squid service.


Discovery 2007-11-28
Entry 2007-12-04
Modified 2007-12-07
squid
ge 2.0 lt 2.6.16_1

ge 3.* lt 3.0.r1.20071001_1

26687
CVE-2007-6239
6f955451-ba54-11d8-b88c-000d610a3b12Buffer overflow in Squid NTLM authentication helper

Remote exploitation of a buffer overflow vulnerability in the NTLM authentication helper routine of the Squid Web Proxy Cache could allow a remote attacker to execute arbitrary code. A remote attacker can compromise a target system if the Squid Proxy is configured to use the NTLM authentication helper. The attacker can send an overly long password to overflow the buffer and execute arbitrary code.


Discovery 2004-05-20
Entry 2004-06-09
squid
< 2.5.5_9

http://www.idefense.com/application/poi/display?id=107&type=vulnerabilities&flashstatus=false
CVE-2004-0541
http://www.osvdb.org/6791
http://secunia.com/advisories/11804
10500
http://www.squid-cache.org/bugs/show_bug.cgi?id=998
705e003a-7f36-11d8-9645-0020ed76ef5asquid ACL bypass due to URL decoding bug

From the Squid advisory:

Squid versions 2.5.STABLE4 and earlier contain a bug in the "%xx" URL decoding function. It may insert a NUL character into decoded URLs, which may allow users to bypass url_regex ACLs.


Discovery 2004-02-29
Entry 2004-03-26
Modified 2015-05-01
squid
< 2.5.5

http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
CVE-2004-0189
7a921e9e-68b1-11d9-9e1e-c296ac722cb3squid -- no sanity check of usernames in squid_ldap_auth

The LDAP authentication helper did not strip leading or trailing spaces from the login name. According to the squid patches page:

LDAP is very forgiving about spaces in search filters and this could be abused to log in using several variants of the login name, possibly bypassing explicit access controls or confusing accounting.

Workaround: Block logins with spaces

	    acl login_with_spaces proxy_auth_regex [:space:]
		    http_access deny login_with_spaces
	    

Discovery 2005-01-10
Entry 2005-01-19
Modified 2005-02-08
squid
< 2.5.7_7

CVE-2005-0173
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
http://www.squid-cache.org/bugs/show_bug.cgi?id=1187
924198
7e97b288-c7ca-11d9-9e1e-c296ac722cb3squid -- DNS lookup spoofing vulnerability

The squid patches page notes:

Malicious users may spoof DNS lookups if the DNS client UDP port (random, assigned by OS as startup) is unfiltered and your network is not protected from IP spoofing.


Discovery 2005-05-11
Entry 2005-05-19
squid
< 2.5.10

CVE-2005-1519
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_reply
http://secunia.com/advisories/15294
81d9dc0c-1988-11df-8e66-0019996bc1f7squid -- Denial of Service vulnerability in HTCP

Squid security advisory 2010:2 reports:

Due to incorrect processing Squid is vulnerable to a denial of service attack when receiving specially crafted HTCP packets.

This problem allows any machine to perform a denial of service attack on the Squid service when its HTCP port is open.


Discovery 2010-02-12
Entry 2010-02-14
Modified 2010-05-02
squid
ge 2.7.1 lt 2.7.7_4

ge 3.0.1 lt 3.0.24

CVE-2010-0639
http://www.squid-cache.org/Advisories/SQUID-2010_2.txt
8dbf7894-a9a8-11d9-a788-0001020eed82squid -- DoS on failed PUT/POST requests vulnerability

The squid patches page notes:

An inconsistent state is entered on a failed PUT/POST request making a high risk for segmentation faults or other strange errors


Discovery 2005-02-03
Entry 2005-04-10
squid
le 2.5.7_12

CVE-2005-0718
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-post
http://www.squid-cache.org/bugs/show_bug.cgi?id=1224
9c2460a4-f6b1-11dd-94d9-0030843d3802squid -- remote denial of service vulnerability

Squid security advisory 2009:1 reports:

Due to an internal error Squid is vulnerable to a denial of service attack when processing specially crafted requests.

This problem allows any client to perform a denial of service attack on the Squid service.


Discovery 2009-02-04
Entry 2009-02-09
Modified 2009-02-10
squid
ge 2.7.1 lt 2.7.6

ge 3.0.1 lt 3.0.13

CVE-2009-0478
http://www.squid-cache.org/Advisories/SQUID-2009_1.txt
http://secunia.com/advisories/33731/
a30e5e44-5440-11d9-9e1e-c296ac722cb3squid -- confusing results on empty acl declarations

Applying an empty ACL list results in unexpected behavior: anything will match an empty ACL list. For example,

The meaning of the configuration gets very confusing when we encounter empty ACLs such as

acl something src "/path/to/empty_file.txt"

http_access allow something somewhere

gets parsed (with warnings) as

http_access allow somewhere

And similarily if you are using proxy_auth acls without having any auth schemes defined.


Discovery 2004-12-21
Entry 2004-12-23
Modified 2005-02-08
squid
< 2.5.7_5

CVE-2005-0194
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-empty_acls
http://www.squid-cache.org/bugs/show_bug.cgi?id=1166
a395397c-c7c8-11d9-9e1e-c296ac722cb3squid -- possible abuse of cachemgr.cgi

The squid patches page notes:

This patch adds access controls to the cachemgr.cgi script, preventing it from being abused to reach other servers than allowed in a local configuration file.


Discovery 1999-07-29
Entry 2005-05-19
squid
< 2.5.10

CVE-1999-0710
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-cachemgr_conf
http://www.squid-cache.org/bugs/show_bug.cgi?id=1094
b4d94fa0-6e38-11d9-9e1e-c296ac722cb3squid -- possible cache-poisoning via malformed HTTP responses

The squid patches page notes:

This patch makes Squid considerably stricter while parsing the HTTP protocol.

  1. A Content-length header should only appear once in a valid request or response. Multiple Content-length headers, in conjunction with specially crafted requests, may allow Squid's cache to be poisoned with bad content in certain situations.
  2. CR characters is only allowed as part of the CR NL line terminator, not alone. This to ensure that all involved agrees on the structure of HTTP headers.
  3. Rejects requests/responses that have whitespace in an HTTP header name.

To enable these strict parsing rules, update to at least squid-2.5.7_9 and specify relaxed_header_parser off in squid.conf.


Discovery 2005-01-24
Entry 2005-01-24
Modified 2006-01-02
squid
< 2.5.7_9

CVE-2005-0174
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-header_parsing
768702
b6da24da-23f7-11e5-a4a5-002590263bf5squid -- client-first SSL-bump does not correctly validate X509 server certificate

Squid security advisory 2015:1 reports:

Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields.

The bug is important because it allows remote servers to bypass client certificate validation. Some attackers may also be able to use valid certificates for one domain signed by a global Certificate Authority to abuse an unrelated domain.

However, the bug is exploitable only if you have configured Squid to perform SSL Bumping with the "client-first" or "bump" mode of operation.

Sites that do not use SSL-Bump are not vulnerable.

All Squid built without SSL support are not vulnerable to the problem.

The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.


Discovery 2015-05-01
Entry 2015-07-06
squid
ge 3.5 lt 3.5.4

ge 3.4 lt 3.4.13

squid33
ge 3.3 lt 3.3.14

squid32
ge 3.2 lt 3.2.14

CVE-2015-3455
http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
bfda39de-7467-11d9-9e1e-c296ac722cb3squid -- correct handling of oversized HTTP reply headers

The squid patches page notes:

This patch addresses a HTTP protocol mismatch related to oversized reply headers. In addition it enhances the cache.log reporting on reply header parsing failures to make it easier to track down which sites are malfunctioning.

It is believed that this bug may lead to cache pollution or allow access controls to be bypassed.


Discovery 2005-01-31
Entry 2005-02-08
squid
< 2.5.7_12

CVE-2005-0241
http://www.squid-cache.org/bugs/show_bug.cgi?id=1216
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patch
ports/76967
823350
c27bc173-d7aa-11db-b141-0016179b2dd5Squid -- TRACE method handling denial of service

Squid advisory 2007:1 notes:

Due to an internal error Squid-2.6 is vulnerable to a denial of service attack when processing the TRACE request method.

Workarounds:

To work around the problem deny access to using the TRACE method by inserting the following two lines before your first http_access rule.

acl TRACE method TRACE

http_access deny TRACE


Discovery 2007-03-20
Entry 2007-03-21
Modified 2010-05-12
squid
ge 2.6.* lt 2.6.12

CVE-2007-1560
http://www.squid-cache.org/Advisories/SQUID-2007_1.txt
c37de843-488e-11e2-a5c9-0019996bc1f7squid -- denial of service

Squid developers report:

Due to missing input validation Squid cachemgr.cgi tool is vulnerable to a denial of service attack when processing specially crafted requests.

This problem allows any client able to reach the cachemgr.cgi to perform a denial of service attack on the service host.

The nature of the attack may cause secondary effects through resource consumption on the host server.


Discovery 2012-12-17
Entry 2012-12-28
Modified 2013-05-02
squid
< 2.7.9_4

ge 3.1 lt 3.1.23

ge 3.2 lt 3.2.6

ge 3.3 lt 3.3.0.3

CVE-2012-5643
CVE-2013-0189
http://www.squid-cache.org/Advisories/SQUID-2012_1.txt
d3324c55-3f11-11e4-ad16-001999f8d30bsquid -- Buffer overflow in SNMP processing

The squid-cache project reports:

Due to incorrect buffer management Squid can be caused by an attacker to write outside its allocated SNMP buffer.


Discovery 2014-09-15
Entry 2014-09-18
squid
< 3.4.8

squid32
gt 0

squid33
< 3.3.13_2

http://www.squid-cache.org/Advisories/SQUID-2014_3.txt
CVE-2014-6270
d3a98c2d-5da1-11e5-9909-002590263bf5squid -- TLS/SSL parser denial of service vulnerability

Amos Jeffries, release manager of the Squid-3 series, reports:

Vulnerable versions are 3.5.0.1 to 3.5.8 (inclusive), which are built with OpenSSL and configured for "SSL-Bump" decryption.

Integer overflows can lead to invalid pointer math reading from random memory on some CPU architectures. In the best case this leads to wrong TLS extensions being used for the client, worst-case a crash of the proxy terminating all active transactions.

Incorrect message size checks and assumptions about the existence of TLS extensions in the SSL/TLS handshake message can lead to very high CPU consumption (up to and including 'infinite loop' behaviour).

The above can be triggered remotely. Though there is one layer of authorization applied before this processing to check that the client is allowed to use the proxy, that check is generally weak. MS Skype on Windows XP is known to trigger some of these.

The FreeBSD port does not use SSL by default and is not vulnerable in the default configuration.


Discovery 2015-09-18
Entry 2015-09-18
Modified 2016-02-18
squid
ge 3.5.0.1 lt 3.5.9

ports/203186
http://www.squid-cache.org/Advisories/SQUID-2015_3.txt
http://www.openwall.com/lists/oss-security/2015/09/18/1
d5b6d151-1887-11e8-94f7-9c5c8e75236asquid -- Vulnerable to Denial of Service attack

Louis Dion-Marcil reports:

Due to incorrect pointer handling Squid is vulnerable to denial of service attack when processing ESI responses.

This problem allows a remote server delivering certain ESI response syntax to trigger a denial of service for all clients accessing the Squid service.

Due to unrelated changes Squid-3.5 has become vulnerable to some regular ESI server responses also triggering this issue.

This problem is limited to the Squid custom ESI parser. Squid built to use libxml2 or libexpat XML parsers do not have this problem.

Due to incorrect pointer handling Squid is vulnerable to denial of service attack when processing ESI responses or downloading intermediate CA certificates.

This problem allows a remote client delivering certain HTTP requests in conjunction with certain trusted server responses to trigger a denial of service for all clients accessing the Squid service.


Discovery 2017-12-13
Entry 2018-02-23
squid
< 3.5.27_3

squid-devel
< 4.0.23

http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
CVE-2018-1000024
CVE-2018-1000027
https://www.debian.org/security/2018/dsa-4122
ports/226138
e05bfc92-0763-11e6-94fa-002590263bf5squid -- multiple vulnerabilities

Squid security advisory 2016:5 reports:

Due to incorrect buffer management Squid cachemgr.cgi tool is vulnerable to a buffer overflow when processing remotely supplied inputs relayed to it from Squid.

This problem allows any client to seed the Squid manager reports with data that will cause a buffer overflow when processed by the cachemgr.cgi tool. However, this does require manual administrator actions to take place. Which greatly reduces the impact and possible uses.

Squid security advisory 2016:6 reports:

Due to buffer overflow issues Squid is vulnerable to a denial of service attack when processing ESI responses. Due to incorrect input validation Squid is vulnerable to public information disclosure of the server stack layout when processing ESI responses. Due to incorrect input validation and buffer overflow Squid is vulnerable to remote code execution when processing ESI responses.

These problems allow ESI components to be used to perform a denial of service attack on the Squid service and all other services on the same machine. Under certain build conditions these problems allow remote clients to view large sections of the server memory. However, the bugs are exploitable only if you have built and configured the ESI features to be used by a reverse-proxy and if the ESI components being processed by Squid can be controlled by an attacker.


Discovery 2016-04-20
Entry 2016-04-21
squid
< 3.5.17

CVE-2016-4051
CVE-2016-4052
CVE-2016-4053
CVE-2016-4054
ports/208939
http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
e1156e90-7ad6-11de-b26a-0048543d60cesquid -- several remote denial of service vulnerabilities

Squid security advisory 2009:2 reports:

Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses.

Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses.

These problems allow any trusted client or external server to perform a denial of service attack on the Squid service.

Squid-2.x releases are not affected.


Discovery 2009-07-27
Entry 2009-07-27
Modified 2009-08-06
squid
ge 3.0.1 lt 3.0.17

ge 3.1.0.1 lt 3.1.0.12

CVE-2009-2621
CVE-2009-2622
http://www.squid-cache.org/Advisories/SQUID-2009_2.txt
e4dac715-c818-11df-a92c-0015587e2cc1squid -- Denial of service vulnerability in request handling

Squid security advisory 2010:3 reports:

Due to an internal error in string handling Squid is vulnerable to a denial of service attack when processing specially crafted requests.

This problem allows any trusted client to perform a denial of service attack on the Squid service.


Discovery 2010-08-30
Entry 2010-09-24
squid
ge 3.0.1 lt 3.0.25_3

ge 3.1.0.1 lt 3.1.8

CVE-2010-3072
http://www.squid-cache.org/Advisories/SQUID-2010_3.txt
f0db930b-496b-11d9-bf86-0050569f0001squid -- possible information disclosure

The squid-2.5 patches pages notes:

In certain conditions Squid returns random data as error messages in response to malformed host name, possibly leaking random internal information which may come from other requests.


Discovery 2004-11-23
Entry 2004-12-09
squid
< 2.5.7_4

http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-dothost