SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Squid Vendors:   Squid-cache.org
(Red Hat Issues Fix) Squid Buffer Overflow in 'cachemgr.cgi' Tool Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1035999
SecurityTracker URL:  http://securitytracker.com/id/1035999
CVE Reference:   CVE-2016-4051   (Links to External Site)
Date:  May 31 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.x, 3.x prior to 3.5.17, 4.x prior to 4.0.9
Description:   A vulnerability was reported in Squid. A remote user can cause arbitrary code to be executed on the target system.

A remote user can send specially crafted data that will be presented in the Squid manager reports. When the target administrator processes the reports via the 'cachemgr.cgi' tool, a buffer overflow occurs and arbitrary code is executed on the target system.

CESG and Yuriy M. Kaminskiy independently reported this vulnerability.

Impact:   A remote user can create data that, when processed by the target administrative user, will execute arbitrary code on the target system.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2016:1139

Vendor URL:  access.redhat.com/errata/RHSA-2016:1139 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Apr 21 2016 Squid Buffer Overflow in 'cachemgr.cgi' Tool Lets Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2016:1139-01] Moderate: squid security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: squid security update
Advisory ID:       RHSA-2016:1139-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:1139
Issue date:        2016-05-31
CVE Names:         CVE-2016-4051 CVE-2016-4052 CVE-2016-4053 
                   CVE-2016-4054 CVE-2016-4553 CVE-2016-4554 
                   CVE-2016-4555 CVE-2016-4556 
=====================================================================

1. Summary:

An update for squid is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64

3. Description:

Squid is a high-performance proxy caching server for web clients,
supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* A buffer overflow flaw was found in the way the Squid cachemgr.cgi
utility processed remotely relayed Squid input. When the CGI interface
utility is used, a remote attacker could possibly use this flaw to execute
arbitrary code. (CVE-2016-4051)

* Buffer overflow and input validation flaws were found in the way Squid
processed ESI responses. If Squid was used as a reverse proxy, or for
TLS/HTTPS interception, a remote attacker able to control ESI components on
an HTTP server could use these flaws to crash Squid, disclose parts of the
stack memory, or possibly execute arbitrary code as the user running Squid.
(CVE-2016-4052, CVE-2016-4053, CVE-2016-4054)

* An input validation flaw was found in the way Squid handled intercepted
HTTP Request messages. An attacker could use this flaw to bypass the
protection against issues related to CVE-2009-0801, and perform cache
poisoning attacks on Squid. (CVE-2016-4553)

* An input validation flaw was found in Squid's mime_get_header_field()
function, which is used to search for headers within HTTP requests. An
attacker could send an HTTP request from the client side with specially
crafted header Host header that bypasses same-origin security protections,
causing Squid operating as interception or reverse-proxy to contact the
wrong origin server. It could also be used for cache poisoning for client
not following RFC 7230. (CVE-2016-4554)

* A NULL pointer dereference flaw was found in the way Squid processes ESI
responses. If Squid was used as a reverse proxy or for TLS/HTTPS
interception, a malicious server could use this flaw to crash the Squid
worker process. (CVE-2016-4555)

* An incorrect reference counting flaw was found in the way Squid processes
ESI responses. If Squid is configured as reverse-proxy, for TLS/HTTPS
interception, an attacker controlling a server accessed by Squid, could
crash the squid worker, causing a Denial of Service attack. (CVE-2016-4556)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, the squid service will be restarted
automatically.

5. Bugs fixed (https://bugzilla.redhat.com/):

1329126 - CVE-2016-4051 squid: buffer overflow in cachemgr.cgi
1329136 - CVE-2016-4052 CVE-2016-4053 CVE-2016-4054 squid: multiple issues in ESI processing
1334233 - CVE-2016-4553 squid: Cache poisoning issue in HTTP Request handling
1334241 - CVE-2016-4554 squid: Header Smuggling issue in HTTP Request processing
1334246 - CVE-2016-4555 squid: SegFault from ESIInclude::Start
1334786 - CVE-2016-4556 squid: SIGSEGV in ESIContext response handling

6. Package List:

Red Hat Enterprise Linux Server (v. 7):

Source:
squid-3.3.8-26.el7_2.3.src.rpm

ppc64:
squid-3.3.8-26.el7_2.3.ppc64.rpm
squid-debuginfo-3.3.8-26.el7_2.3.ppc64.rpm

ppc64le:
squid-3.3.8-26.el7_2.3.ppc64le.rpm
squid-debuginfo-3.3.8-26.el7_2.3.ppc64le.rpm

s390x:
squid-3.3.8-26.el7_2.3.s390x.rpm
squid-debuginfo-3.3.8-26.el7_2.3.s390x.rpm

x86_64:
squid-3.3.8-26.el7_2.3.x86_64.rpm
squid-debuginfo-3.3.8-26.el7_2.3.x86_64.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

ppc64:
squid-debuginfo-3.3.8-26.el7_2.3.ppc64.rpm
squid-sysvinit-3.3.8-26.el7_2.3.ppc64.rpm

ppc64le:
squid-debuginfo-3.3.8-26.el7_2.3.ppc64le.rpm
squid-sysvinit-3.3.8-26.el7_2.3.ppc64le.rpm

s390x:
squid-debuginfo-3.3.8-26.el7_2.3.s390x.rpm
squid-sysvinit-3.3.8-26.el7_2.3.s390x.rpm

x86_64:
squid-debuginfo-3.3.8-26.el7_2.3.x86_64.rpm
squid-sysvinit-3.3.8-26.el7_2.3.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
squid-3.3.8-26.el7_2.3.src.rpm

x86_64:
squid-3.3.8-26.el7_2.3.x86_64.rpm
squid-debuginfo-3.3.8-26.el7_2.3.x86_64.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

x86_64:
squid-debuginfo-3.3.8-26.el7_2.3.x86_64.rpm
squid-sysvinit-3.3.8-26.el7_2.3.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-4051
https://access.redhat.com/security/cve/CVE-2016-4052
https://access.redhat.com/security/cve/CVE-2016-4053
https://access.redhat.com/security/cve/CVE-2016-4054
https://access.redhat.com/security/cve/CVE-2016-4553
https://access.redhat.com/security/cve/CVE-2016-4554
https://access.redhat.com/security/cve/CVE-2016-4555
https://access.redhat.com/security/cve/CVE-2016-4556
https://access.redhat.com/security/updates/classification/#moderate
http://www.squid-cache.org/Advisories/SQUID-2016_5.txt
http://www.squid-cache.org/Advisories/SQUID-2016_6.txt
http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
http://www.squid-cache.org/Advisories/SQUID-2016_9.txt

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXTS26XlSAg2UNWIIRAgGXAKCUUJCPift+x00t5mWx0vTXqkRvGACgjk5Z
2yeGJSARyEwp3OzfyumvjfQ=
=0Myb
-----END PGP SIGNATURE-----


--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC