drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Squid
Name: |
Zwei Probleme in Squid |
|
ID: |
USN-2921-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.10 |
|
Datum: |
Mo, 7. März 2016, 14:38 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270 |
|
Applikationen: |
Squid |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7993326761975268311== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="3XjVbfR3tCDR1L4EUDXU6TceAJjXPjs6H"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --3XjVbfR3tCDR1L4EUDXU6TceAJjXPjs6H Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2921-1 March 07, 2016
squid3 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in Squid.
Software Description: - squid3: Web proxy cache server
Details:
Sebastian Krahmer discovered that Squid incorrectly handled certain SNMP requests. If SNMP is enabled, a remote attacker could use this issue to cause Squid to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2014-6270)
Alex Rousskov discovered that Squid incorrectly handled certain malformed responses. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. (CVE-2016-2571)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10: squid3 3.3.8-1ubuntu16.2
Ubuntu 14.04 LTS: squid3 3.3.8-1ubuntu6.6
Ubuntu 12.04 LTS: squid3 3.1.19-1ubuntu3.12.04.6
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2921-1 CVE-2014-6270, CVE-2016-2571
Package Information: https://launchpad.net/ubuntu/+source/squid3/3.3.8-1ubuntu16.2 https://launchpad.net/ubuntu/+source/squid3/3.3.8-1ubuntu6.6 https://launchpad.net/ubuntu/+source/squid3/3.1.19-1ubuntu3.12.04.6
--3XjVbfR3tCDR1L4EUDXU6TceAJjXPjs6H Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAEBCgAGBQJW3YKfAAoJEGVp2FWnRL6TuOQQAIJ/KDH8tan4+QFAlM9/gPPK ocLfTTJvoi8IjdOFECL7bs/ND1Yerg8Iayz7YP7XQUiEpo+PJxMcxF5hgxpZVKtC whcZimOr9I+3k9/+3zzVlt24qBzMnynpU6xWmZgiZ7z1RPKrIs1kPM4syDygVi9i fg1weGKSsV/CnK46xx+nXIz/AP+FDAB08d7i/GAXy3JmV3Vl/AP3bM87M5jYVmqr 6trHSYTOfzELh84Ce46rf2tqeuWuL13r4wiBNb/nQLLQOqRT2F5yKITN2WryQu4B xzLeXBCYId0UFy1bBcyLyqAdqlLumR/nirExiQduFS4TnAqIWj7CJrChsHHdapsq jBRE1UhbcjQ2jvcF+DE/vB45vRJByBn+t9cFhk3qIhdyhwnJQje58jYrBOBDGLmK nMRcQXagXndYkS6o0UQlK+5FRJM58MLGdCbrRJ/bLV0BwZDdXt3dBhzyaEXOx7F0 PWtW08D+XFJvstuhJl2AVfwD3D8vKKL6K84hmXBa6HtHzwgY/fdik4cVmblOgDt6 c1w9kBOjt7dAF0R7rF/d6QUAk8physlQfAFBSEQ0q8qPYfxmFETl6H7YhXQWaRCu lCfn5kmVzoJ84XqTQ/XkIfic/25iy4GPlEBhRml1WEBG/wyuZu4lxQ1RcS3kn3A2 KkjqevRuP8uw/PNaWjwj =XTpQ -----END PGP SIGNATURE-----
--3XjVbfR3tCDR1L4EUDXU6TceAJjXPjs6H--
--===============7993326761975268311== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============7993326761975268311==--
|
|
|
|