oss-sec mailing list archives
Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS
From: "Steven M. Christey" <coley () linus mitre org>
Date: Sun, 8 Feb 2009 16:31:00 -0500 (EST)
I do subscribe to oss-security so see these emails. Still working on the best process to be able to respond more quickly. The SQUID advisory doesn't state what kind of DoS it is, and it's not clear from the patches either. Is it a crash, hang, resource consumption, etc.? Not essential from a CVE perspective but probanly convenient to Squid users. - Steve ====================================================== Name: CVE-2009-0478 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478 Reference: CONFIRM:http://www.squid-cache.org/Advisories/SQUID-2009_1.txt Reference: CONFIRM:http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which is not properly handled in (1) HttpMsg.c and (2) HttpStatusLine.c.
Current thread:
- CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Robert Buchholz (Feb 04)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Josh Bressers (Feb 06)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Robert Buchholz (Feb 07)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Steven M. Christey (Feb 08)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Josh Bressers (Feb 08)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Robert Buchholz (Feb 07)
- Re: CVE request: Squid <2.7.6, 3.0.13, 3.1.0.5 DoS Josh Bressers (Feb 06)