oss-sec mailing list archives
CVE Request: Squid HTTP Proxy Denial of Service
From: Amos Jeffries <squid3 () treenet co nz>
Date: Fri, 18 Sep 2015 12:58:28 +1200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, The TLS/SSL parser in the latest series of Squid HTTP Proxy has been found to have several bugs leading to Denial of Service possibilities. Can CVE be assigned as appropriate please? Vulnerable versions are 3.5.0.1 to 3.5.8 (inclusive), which are built with OpenSSL and configured for "SSL-Bump" decryption. Integer overflows can lead to invalid pointer math reading from random memory on some CPU architectures. In the best case this leads to wrong TLS extensiosn being used for the client, worst-case a crash of the proxy terminating all active transactions. Fixed by <http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13914.p atch>. Incorrect message size checks and assumptions about the existence of TLS extensions in the SSL/TLS handshake message can lead to very high CPU consumption (up to and including 'infinite loop' behaviour). Fixed by <http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13915.p atch>. The above can be triggered remotely. Though there is one layer of authorization applied before this processing to check that the client is allowed to use the proxy, that check is generally weak. MS Skype on Windows XP is known to trigger some of these. (Formal release with advisory will be coming in a few days. 3.5.9 tarballs are available now, via FTP if the web mirrors ). Amos Jeffries Squid Software Foundation -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQIcBAEBAgAGBQJV+2FtAAoJEGvSOzfXE+nLjTYQAKYzOQgAIx4KpGFN/UROI60A BAy/nVY1VCh6T00TVYTMvQYZ5bFKZQGvfmrEieJjFFfzQp2LKIox6+kHBVX68lr4 qbYolG3G+KBi5yXauz8lYOJgM5PiyzfIN9eRgrN/+wEwsmpiiGSHCTHRSIV0CKDM nD11F+YlxZaRvk8MJSO19owCh89xegxNoQv6ihvgW26qFc9qwbqPmJRsxqcVmFQb KDFUMuaWuRKKUuGtdstevMstiXgDRmrxP7LvKXvDG6bFUX5RRKTCqjlm1K+Hbu8E lZhU9bpQ4zF16UArDrW4Lz7znvxi2ueF8Q8dndBk5sqOpv+IKfINU6a7oltoVNe3 Ygmm2aaRYe4OZ1O8RbP+GxWAWhaAyVplaiglHRSTHBdzEdtvo9E5aBTYfK0NsOrM y2fHiHUzjTpXWoVVGVRg9aJOd6PU9rIqQXTV6E0cJaBYd3/A8MDkMVE+gqA7zSBr MD1UYbjHBSRic7i4dFH9qKhLcrsubUxcCTIOcnrs1eganJUjdayPEIM4weaEQo4+ 2laWZyoRKhtt09M2pxkvBt79w4kpaY3aaq/0u+93egBxB5B5zSDz8kDpBr+HcC6z uTq8DM0ifRjHMQ9S8yE52Nu5BdajRzu21YcmBRjmzosYRiFtsnZ6FHp00uk+lVck MDALS3abLHGb/drICWfk =ctML -----END PGP SIGNATURE-----
Current thread:
- CVE Request: Squid HTTP Proxy Denial of Service Amos Jeffries (Sep 17)
- <Possible follow-ups>
- CVE Request: Squid HTTP Proxy Denial of Service Amos Jeffries (Sep 17)
- CVE Request: Squid HTTP Proxy Denial of Service Amos Jeffries (Sep 17)