__________________________________________________________________
Squid Proxy Cache Security Update Advisory SQUID-2013:1
__________________________________________________________________
Advisory ID: SQUID-2013:1
Date: March 14, 2013
Summary: Denial of Service in Language Negotiation
Affected versions: Squid 3.2 -> 3.2.8
Squid 3.3 -> 3.3.2
Fixed in Version: Squid 3.2.9, 3.3.3
__________________________________________________________________
http://www.squid-cache.org/Advisories/SQUID-2013_1.txt
http://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-1839
__________________________________________________________________
Problem Description:
A bug exists in the code that parses Accept-Language header for
error response language negotiation. The bug results in a code
loop that prevents Squid servicing any traffic.
__________________________________________________________________
Severity:
Specially crafted requests from any source will cause Squid to
stop responding to all clients.
__________________________________________________________________
Updated Packages:
This bug is fixed by Squid versions 3.2.9 and 3.3.3.
In addition, patches addressing this problem in the stable
releases can be found in our patch archives.
Squid-3.3:
http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2013_1.patch
Squid-3.2:
http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2013_1.patch
If you are using a prepackaged version of Squid then please refer
to the package vendor for availability information on updated
packages.
__________________________________________________________________
Determining if your version is vulnerable:
All Squid-2.x versions are not vulnerable.
All Squid-3.0 and Squid-3.1 versions are not vulnerable.
All Squid configured with error_directory disabling negotiation
are not vulnerable.
All Squid built with --disable-auto-locale disabling negotiation
are not vulnerable.
Unpatched Squid-3.2 releases up to and including 3.2.8 are
vulnerable.
Unpatched Squid-3.3 releases up to and including 3.3.2 are
vulnerable.
__________________________________________________________________
Workarounds:
Disabling language auto-negotiation.
Either
Configure error_directory directive to an explicit template
directory to force that language instead of negotiation.
Restart or reconfigure Squid after editing squid.conf.
Or
build Squid using ./configure --disable-auto-locale
__________________________________________________________________
Contact details for the Squid project:
For installation / upgrade support on binary packaged versions
of Squid: Your first point of contact should be your binary
package vendor.
If your install and build Squid from the original Squid sources
then the squid-users_at_squid-cache.org mailing list is your primary
support point. For subscription details see
<http://www.squid-cache.org/Support/mailing-lists.html>.
For reporting of non-security bugs in the latest STABLE release
the squid bugzilla database should be used
<http://bugs.squid-cache.org/>.
For reporting of security sensitive bugs send an email to the
squid-bugs_at_squid-cache.org mailing list. It's a closed list
(though anyone can post) and security related bug reports are
treated in confidence until the impact has been established.
__________________________________________________________________
Credits:
The vulnerability was reported by Kurt Seifried, Red Hat Security
Response Team
__________________________________________________________________
Revision history:
2013-03-05 20:53 GMT 0-day attack publication
2013-03-07 21:07 GMT Squid Project notification
2013-03-07 22:18 GMT Initial patch release
2013-03-13 23:52 GMT Initial release of this document
__________________________________________________________________
END
Received on Wed Mar 13 2013 - 22:57:07 MDT
This archive was generated by hypermail 2.2.0 : Thu Mar 14 2013 - 12:00:06 MDT