{"vuid":"VU#232881","idnumber":"232881","name":"Squid remote denial-of-service vulnerability","keywords":["Squid","DoS","Denial of service","cache update replies","INFO#11101"],"overview":"The Squid Proxy server contains a vulnerability that may allow an attacker to create a denial-of-service condition that affects the Squid server and systems that rely on it.","clean_desc":"Squid Proxy Cache is a caching proxy that supports the HTTP, HTTPS, and FTP protocols. Squid can also be deployed as a reverse proxy. From Squid Proxy Cache Security Update Advisory SQUID-2007:2\nDue to incorrect bounds checking Squid is vulnerable to a denial of service check during some cache update reply processing. This incorrect bounds checking occurs within the httpHeaderUpdate() function when processing cache update replies.","impact":"An attacker who can access the Squid proxy may be able to cause the proxy server to crash. If the Squid proxy is deployed as a reverse proxy, the web servers relying on the proxy may also be affected.","resolution":"Update\nThe Squid team has released patches 11780 and 11211 to address this issue. Administrators who obtain Squid from their operating system vendor should see the systems affected portion of this document for a partial list of affected vendors.","workarounds":"Restrict access Restricting access to the Squid proxy via access control lists or firewall rules may prevent this vulnerability from being exploited by remote attackers..","sysaffected":"","thanks":"The Squid proxy team credits the \nWikimedia Foundation\n for discovering this vulnerability. Adrian Chadd and \nHenrik Nordstrom are credited for authoring patches that address the issue.","author":"This document was written by Ryan Giobbi.","public":["http://www.squid-cache.org/Advisories/SQUID-2007_2.txt","http://wiki.squid-cache.org/SquidFaq/ReverseProxy","http://wiki.squid-cache.org/SquidFaq/SquidAcl#head-c87419712cac704d01cecc7da11cd02f489b6986","http://secunia.com/advisories/27910/"],"cveids":["CVE-2007-6239"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-12-04T15:46:44Z","publicdate":"2007-11-27T00:00:00Z","datefirstpublished":"2007-12-10T19:11:41Z","dateupdated":"2008-01-18T16:35:40Z","revision":12,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"16","cam_exploitation":"1","cam_internetinfrastructure":"9","cam_population":"7","cam_impact":"10","cam_easeofexploitation":"11","cam_attackeraccessrequired":"20","cam_scorecurrent":"7.5075","cam_scorecurrentwidelyknown":"8.6625","cam_scorecurrentwidelyknownexploited":"14.14875","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.5075,"vulnote":null}