Denial of Service in Squid
ID: | DSA-3139-1 |
Distribution: | Debian |
Plattformen: | Debian wheezy |
Datum: | So, 25. Januar 2015, 23:42 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609 |
Applikationen: | Squid |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3139-1 security@debian.org http://www.debian.org/security/ Sebastien Delafond January 25, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : squid CVE ID : CVE-2014-3609 Debian Bug : 776194 Matthew Daley discovered that squid, a web proxy cache, does not properly perform input validation when parsing requests. A remote attacker could use this flaw to mount a denial of service attack, by sending specially crafted Range requests. For the stable distribution (wheezy), this problem has been fixed in version 2.7.STABLE9-4.1+deb7u1. We recommend that you upgrade your squid packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJUxRveAAoJEBC+iYPz1Z1kw1QIALUg7hslEvXpHrTTdSTD1CQF wVvi9gDL0jb+bDnM+4kjxvztF+AUudonNYy45P0LezKEEOLJ4kVVSy1yg/mjCgra K8TQcIeGt3go2vV/zQ3dqCB+l2uLCuKeBU9QMw70BSdcfKq9s2IoqH/DE3rjj53D x6xdk68I6/bvFG3yfuUUO3HPZt4Co6KVF/UPqmtZNBA8qKDCzbWZHJIwxXHteoFK CXPCQjCVRz50G9jhZvpiiGXjd/xASC2cxs+9+j7towv4B53JcL7n02cruS3g6QAM E7XkLhUMgXfIbvX3L657H60h6wCKWRqS4y9aWbbtYVRZU/zefnBTySKLWXBZ8J0= =fC2O -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org Archive: https://lists.debian.org/E1YFQC5-00040s-Qb@centurion.befour.org |