SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Squid Vendors:   Squid-cache.org
(Ubuntu Issues Fix) Squid HTTP Response Processing Bugs Let Remote Users Deny Service to Proxy Client Users
SecurityTracker Alert ID:  1035195
SecurityTracker URL:  http://securitytracker.com/id/1035195
CVE Reference:   CVE-2016-2571   (Links to External Site)
Date:  Mar 7 2016
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 3.x, 4.x
Description:   Some vulnerabilities were reported in Squid. A remote user can cause denial of service conditions on the target client systems.

A remote server can return a specially crafted HTTP response to trigger an overflow in the proxy, causing all connected client users to be disconnected.

Mathias Fischer from Open Systems AG reported this vulnerability.

A remote server can return a specially crafted HTTP response to trigger an error handling flaw in the proxy, causing all connected client users to be disconnected.

Alex Rousskov from The Measurement Factory reported this vulnerability.

These vulnerabilities are being actively exploited.

Impact:   A remote user can cause the target connected client users to be disconnected.
Solution:   Ubuntu has issued a fix for CVE-2016-2571.

The Ubuntu advisory is available at:

http://www.ubuntu.com/usn/usn-2921-1

Vendor URL:  www.ubuntu.com/usn/usn-2921-1 (Links to External Site)
Cause:   Boundary error, Exception handling error
Underlying OS:  Linux (Ubuntu)
Underlying OS Comments:  12.04 LTS, 14.04 LTS, 15.10

Message History:   This archive entry is a follow-up to the message listed below.
Feb 24 2016 Squid HTTP Response Processing Bugs Let Remote Users Deny Service to Proxy Client Users



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC