Bugzilla – Bug 829084
VUL-1: CVE-2013-4115: squid: SQUID-2013:2: buffer overflow in HTTP request handling
Last modified: 2018-10-19 18:20:18 UTC
is public, via oss-sec Hi, Squid has released a security advisory[0]: > Due to incorrect data validation Squid is vulnerable to a buffer > overflow attack when processing specially crafted HTTP requests. [0]http://www.squid-cache.org/Advisories/SQUID-2013_2.txt Could a CVE id be assigned please? Thanks in advance. [CC'ing squid's security address so that they can include the id in the advisory once assigned] Cheers, -- Raphael Geissert - Debian Developer www.debian.org - get.debian.net
I'm full-quoting the squid advisory: http://www.squid-cache.org/Advisories/SQUID-2013_2.txt __________________________________________________________________ Squid Proxy Cache Security Update Advisory SQUID-2013:2 __________________________________________________________________ Advisory ID: SQUID-2013:2 Date: July 11, 2013 Summary: Buffer overflow in HTTP request handling Affected versions: Squid 3.2 -> 3.2.11, Squid 3.3 -> 3.3.6 Fixed in version: Squid 3.2.12, 3.3.7 __________________________________________________________________ http://www.squid-cache.org/Advisories/SQUID-2013_2.txt __________________________________________________________________ Problem Description: Due to incorrect data validation Squid is vulnerable to a buffer overflow attack when processing specially crafted HTTP requests. __________________________________________________________________ Severity: This problem allows any trusted client or client script who can generate HTTP requests to trigger a buffer overflow in Squid, resulting in a termination of the Squid service. __________________________________________________________________ Updated Packages: This bug is fixed by Squid versions 3.2.12 and 3.3.7. In addition, patches addressing the underlying problem for all Squid versions can be found in our patch archives. Squid 3.0: http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch Squid 3.1: http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch Squid 3.2: http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch Squid 3.3: http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. __________________________________________________________________ Determining if your version is vulnerable: All Squid-3.1 and older versions, including Squid-2.x are not vulnerable. All unpatched Squid-3.2 versions up to and including 3.2.11 with 'intercept' or 'tproxy' option set on a http_port or https_port line in their squid.conf are vulnerable. All unpatched Squid-3.2 versions up to and including 3.2.11 with 'host_verify_strict' option set to ON in their squid.conf are vulnerable. All unpatched Squid-3.3 versions up to and including 3.3.6 with 'intercept' or 'tproxy' option set on a http_port or https_port line in their squid.conf are vulnerable. All unpatched Squid-3.3 versions up to and including 3.3.6 with 'host_verify_strict' option set to ON in their squid.conf are vulnerable. __________________________________________________________________ Workarounds: There are no workarounds for this issue when intercepting traffic with NAT or TPROXY. Use of transparent auto-configuration via WPAD and/or PAC is recommended practice instead of interception. If the vulnerability is due to use of the host_verify_strict directive in squid.conf. Removing it or setting it to OFF (the default) will remove the vulnerability for reverse-proxy and forward-proxy traffic. Any intercepted traffic will remain vulnerable. __________________________________________________________________ Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If your install and build Squid from the original Squid sources then the squid-users@squid-cache.org mailing list is your primary support point. For subscription details see <http://www.squid-cache.org/Support/mailing-lists.html>. For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used <http://bugs.squid-cache.org/>. For reporting of security sensitive bugs send an email to the squid-bugs@squid-cache.org mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. __________________________________________________________________ Credits: The vulnerability was reported and fix provided by Nathan Hoad, Netbox Blue Pty Ltd __________________________________________________________________ Revision history: 2013-07-10 03:25 GMT Initial Report 2013-07-10 18:45 GMT Patches Released __________________________________________________________________ END
Created attachment 547606 [details] upstrem patch for SQUID-2013:2. upstream patch against version 3.1. squid-2.7.STABLE5 from SLE11 basically contains the same code.
bugbot adjusting priority
The SWAMPID for this issue is 53765. This issue was rated as moderate. Please submit fixed packages until 2013-08-08. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
This is an autogenerated message for OBS integration: This bug (829084) was mentioned in https://build.opensuse.org/request/show/196901 12.2 / squid https://build.opensuse.org/request/show/196904 12.3 / squid https://build.opensuse.org/request/show/196905 12.2 / squid3 https://build.opensuse.org/request/show/196906 Evergreen:11.4 / squid https://build.opensuse.org/request/show/196907 Evergreen:11.4 / squid3.openSUSE_Evergreen_11.4 https://build.opensuse.org/request/show/196908 Evergreen:11.2:Test / squid https://build.opensuse.org/request/show/196909 Evergreen:11.2:Test / squid3
This is an autogenerated message for OBS integration: This bug (829084) was mentioned in https://build.opensuse.org/request/show/196912 12.2 / squid https://build.opensuse.org/request/show/196914 12.2 / squid https://build.opensuse.org/request/show/196915 12.3 / squid https://build.opensuse.org/request/show/196917 12.2 / squid3 https://build.opensuse.org/request/show/196918 Evergreen:11.2:Test / squid https://build.opensuse.org/request/show/196919 Evergreen:11.2:Test / squid3 https://build.opensuse.org/request/show/196920 Evergreen:11.4 / squid https://build.opensuse.org/request/show/196921 Evergreen:11.4 / squid3.openSUSE_Evergreen_11.4
This is an autogenerated message for OBS integration: This bug (829084) was mentioned in https://build.opensuse.org/request/show/196913 Maintenance / https://build.opensuse.org/request/show/196916 Maintenance /
Dah... There were some duplicate submissions; they were removed, but the above looks much messier than it actually is. Reassigning to security-team@suse.de for shipping+handling.
openSUSE-SU-2013:1435-1: An update that solves two vulnerabilities and has one errata is now available. Category: security (moderate) Bug References: 677335,829084,830319 CVE References: CVE-2013-4115,CVE-2013-4123 Sources used: openSUSE 12.3 (src): squid-3.2.11-3.8.1
openSUSE-SU-2013:1436-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 677335,794954,796999,829084 CVE References: CVE-2012-5643,CVE-2013-0188,CVE-2013-0189,CVE-2013-4115 Sources used: openSUSE 12.2 (src): squid-2.7.STABLE9-9.4.1
openSUSE-SU-2013:1441-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 677335,829084 CVE References: CVE-2013-4115 Sources used: openSUSE 12.2 (src): squid3-3.1.23-2.8.1
openSUSE-SU-2013:1443-1: An update that fixes four vulnerabilities is now available. Category: security (moderate) Bug References: 677335,796999,829084 CVE References: CVE-2012-5643,CVE-2013-0188,CVE-2013-0189,CVE-2013-4115 Sources used: openSUSE 11.4 (src): squid-2.7.STABLE6-10.17.1
openSUSE-SU-2013:1444-1: An update that solves one vulnerability and has one errata is now available. Category: security (moderate) Bug References: 677335,829084 CVE References: CVE-2013-4115 Sources used: openSUSE 11.4 (src): squid3-3.1.23-19.1
Update released for: squid Products: SUSE-CORE 9-SP3-TERADATA (x86_64)
Update released for: squid, squid-debuginfo, squid-debugsource Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Update released for: squid, squid-debuginfo, squid-debugsource Products: SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP3 (i386, x86_64)
Update released for: squid, squid-debuginfo Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: squid, squid-debuginfo, squid-debugsource Products: SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
fixes released