Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20160401220924.8B09373C090@smtpvmsrv1.mitre.org>
Date: Fri,  1 Apr 2016 18:09:24 -0400 (EDT)
From: cve-assign@...re.org
To: squid3@...enet.co.nz
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: Squid HTTP Proxy

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> 1) A buffer overrun (on write(2)) has been found in Squid proxy 'pinger'
> process that allows an attacker to craft ICMPv6 messages that will
> either crash the child process (if the OS prootects against over-write)
> or alter heap contents allowing the attacker to bypass CVE-2014-7142
> protection and leak arbitrary heap data into the Squid log files. The
> pinger is setuid root (though it does drop those privileges prior to
> this attack being possible).
> 
> Patch for this issue is available at:
> http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14015.patch
> 
> The upstream advisory will be at this URL:
> http://www.squid-cache.org/Advisories/SQUID-2016_3.txt

Use CVE-2016-3947.


> 2) A secondary issue with the same Denial of Service effects as
> CVE-2016-2569 has been found that is not covered by the existing fix.
> All Squid-3.x versions up to and including 3.5.15, and 4.0.x versions up
> to and including 4.0.7 are vulnerable to this issue independent of the
> fix for CVE-2016-2569.
> 
> Patch for this is available at:
> http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14016.patch
> 
> The upstream advisory will be at this URL:
> http://www.squid-cache.org/Advisories/SQUID-2016_4.txt

Use CVE-2016-3948.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=ZN5k
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.