__________________________________________________________________ Squid Proxy Cache Security Update Advisory SQUID-2013:3 __________________________________________________________________ Advisory ID: SQUID-2013:3 Date: July 13, 2013 Summary: Denial of service in request processing Affected versions: Squid 3.2 -> 3.2.12, Squid 3.3 -> 3.3.7 Fixed in version: Squid 3.2.13, 3.3.8 __________________________________________________________________ http://www.squid-cache.org/Advisories/SQUID-2013_3.txt http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4123 __________________________________________________________________ Problem Description: Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted HTTP requests __________________________________________________________________ Severity: This problem allows any client who can generate HTTP requests to perform a denial of service attack on the Squid service. __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 3.2.13 and 3.3.8. In addition, patches addressing this problem can be found in our patch archives. Squid 3.2: http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11826.patch Squid 3.3: http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12591.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: All Squid-3.1 and older versions, including Squid-2 are not vulnerable. All unpatched Squid-3.2 versions up to and including 3.2.12 are vulnerable. All unpatched Squid-3.3 versions up to and including 3.3.7 are vulnerable. __________________________________________________________________ Workarounds: There are no workarounds for this issue. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If your install and build Squid from the original Squid sources then the squid-users@squid-cache.org mailing list is your primary support point. For subscription details see . For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used . For reporting of security sensitive bugs send an email to the squid-bugs@squid-cache.org mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: The vulnerability was reported by Alex Rousskov, The Measurement Factory and Saran Neti, TELUS Security Labs. __________________________________________________________________ Revision history: 2013-06-05 23:58 GMT Initial Report 2013-07-12 18:46 GMT Second Report 2013-07-14 16:31 GMT Advisory and Patches released 2013-07-16 03:07 GMT Updated timeline and credits __________________________________________________________________ END