Bug 829084 (CVE-2013-4115) - VUL-1: CVE-2013-4115: squid: SQUID-2013:2: buffer overflow in HTTP request handling
Summary: VUL-1: CVE-2013-4115: squid: SQUID-2013:2: buffer overflow in HTTP request ha...
Status: RESOLVED FIXED
Alias: CVE-2013-4115
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Deadline: 2013-08-29
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp1:54370 maint...
Keywords:
Depends on:
Blocks:
 
Reported: 2013-07-11 15:33 UTC by Marcus Meissner
Modified: 2018-10-19 18:20 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
upstrem patch for SQUID-2013:2. (2.44 KB, patch)
2013-07-11 15:53 UTC, Roman Drahtmueller
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2013-07-11 15:33:24 UTC
is public, via oss-sec

Hi,

Squid has released a security advisory[0]:
> Due to incorrect data validation Squid is vulnerable to a buffer
> overflow attack when processing specially crafted HTTP requests.

[0]http://www.squid-cache.org/Advisories/SQUID-2013_2.txt

Could a CVE id be assigned please?

Thanks in advance.

[CC'ing squid's security address so that they can include the id in
the advisory once assigned]

Cheers,
--
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net
Comment 1 Roman Drahtmueller 2013-07-11 15:47:12 UTC
I'm full-quoting the squid advisory:

http://www.squid-cache.org/Advisories/SQUID-2013_2.txt


__________________________________________________________________

      Squid Proxy Cache Security Update Advisory SQUID-2013:2
__________________________________________________________________

Advisory ID:            SQUID-2013:2
Date:                   July 11, 2013
Summary:                Buffer overflow in HTTP request handling
Affected versions:      Squid 3.2 -> 3.2.11,
                        Squid 3.3 -> 3.3.6
Fixed in version:       Squid 3.2.12, 3.3.7
__________________________________________________________________

     http://www.squid-cache.org/Advisories/SQUID-2013_2.txt
__________________________________________________________________

Problem Description:

 Due to incorrect data validation Squid is vulnerable to a buffer
 overflow attack when processing specially crafted HTTP requests.

__________________________________________________________________

Severity:

 This problem allows any trusted client or client script who can
 generate HTTP requests to trigger a buffer overflow in Squid,
 resulting in a termination of the Squid service.

__________________________________________________________________

Updated Packages:

 This bug is fixed by Squid versions 3.2.12 and 3.3.7.

 In addition, patches addressing the underlying problem for all
 Squid versions can be found in our patch archives.

Squid 3.0:
 http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9200.patch

Squid 3.1:
 http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10487.patch

Squid 3.2:
 http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11823.patch

Squid 3.3:
 http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12587.patch

 If you are using a prepackaged version of Squid then please refer
 to the package vendor for availability information on updated
 packages.

__________________________________________________________________

Determining if your version is vulnerable:

 All Squid-3.1 and older versions, including Squid-2.x are not
 vulnerable.

 All unpatched Squid-3.2 versions up to and including 3.2.11 with
 'intercept' or 'tproxy' option set on a http_port or https_port
 line in their squid.conf are vulnerable.

 All unpatched Squid-3.2 versions up to and including 3.2.11 with
 'host_verify_strict' option set to ON in their squid.conf are
 vulnerable.

 All unpatched Squid-3.3 versions up to and including 3.3.6 with
 'intercept' or 'tproxy' option set on a http_port or https_port
 line in their squid.conf are vulnerable.

 All unpatched Squid-3.3 versions up to and including 3.3.6 with
 'host_verify_strict' option set to ON in their squid.conf are
 vulnerable.

__________________________________________________________________

Workarounds:

 There are no workarounds for this issue when intercepting traffic
 with NAT or TPROXY. Use of transparent auto-configuration via
 WPAD and/or PAC is recommended practice instead of interception.


 If the vulnerability is due to use of the host_verify_strict
 directive in squid.conf. Removing it or setting it to OFF (the
 default) will remove the vulnerability for reverse-proxy and
 forward-proxy traffic. Any intercepted traffic will remain
 vulnerable.

__________________________________________________________________

Contact details for the Squid project:

 For installation / upgrade support on binary packaged versions
 of Squid: Your first point of contact should be your binary
 package vendor.

 If your install and build Squid from the original Squid sources
 then the squid-users@squid-cache.org mailing list is your primary
 support point. For subscription details see
 <http://www.squid-cache.org/Support/mailing-lists.html>.

 For reporting of non-security bugs in the latest STABLE release
 the squid bugzilla database should be used
 <http://bugs.squid-cache.org/>.

 For reporting of security sensitive bugs send an email to the
 squid-bugs@squid-cache.org mailing list. It's a closed list
 (though anyone can post) and security related bug reports are
 treated in confidence until the impact has been established.

__________________________________________________________________

Credits:

 The vulnerability was reported and fix provided by Nathan Hoad,
 Netbox Blue Pty Ltd

__________________________________________________________________

Revision history:

 2013-07-10 03:25 GMT Initial Report
 2013-07-10 18:45 GMT Patches Released
__________________________________________________________________
END
Comment 2 Roman Drahtmueller 2013-07-11 15:53:48 UTC
Created attachment 547606 [details]
upstrem patch for SQUID-2013:2.

upstream patch against version 3.1.

squid-2.7.STABLE5 from SLE11 basically contains the same code.
Comment 3 Swamp Workflow Management 2013-07-11 22:00:43 UTC
bugbot adjusting priority
Comment 4 Swamp Workflow Management 2013-07-25 14:28:20 UTC
The SWAMPID for this issue is 53765.
This issue was rated as moderate.
Please submit fixed packages until 2013-08-08.
When done, please reassign the bug to security-team@suse.de.
Patchinfo will be handled by security team.
Comment 10 Bernhard Wiedemann 2013-08-30 15:01:52 UTC
This is an autogenerated message for OBS integration:
This bug (829084) was mentioned in
https://build.opensuse.org/request/show/196901 12.2 / squid
https://build.opensuse.org/request/show/196904 12.3 / squid
https://build.opensuse.org/request/show/196905 12.2 / squid3
https://build.opensuse.org/request/show/196906 Evergreen:11.4 / squid
https://build.opensuse.org/request/show/196907 Evergreen:11.4 / squid3.openSUSE_Evergreen_11.4
https://build.opensuse.org/request/show/196908 Evergreen:11.2:Test / squid
https://build.opensuse.org/request/show/196909 Evergreen:11.2:Test / squid3
Comment 11 Bernhard Wiedemann 2013-08-30 16:00:42 UTC
This is an autogenerated message for OBS integration:
This bug (829084) was mentioned in
https://build.opensuse.org/request/show/196912 12.2 / squid
https://build.opensuse.org/request/show/196914 12.2 / squid
https://build.opensuse.org/request/show/196915 12.3 / squid
https://build.opensuse.org/request/show/196917 12.2 / squid3
https://build.opensuse.org/request/show/196918 Evergreen:11.2:Test / squid
https://build.opensuse.org/request/show/196919 Evergreen:11.2:Test / squid3
https://build.opensuse.org/request/show/196920 Evergreen:11.4 / squid
https://build.opensuse.org/request/show/196921 Evergreen:11.4 / squid3.openSUSE_Evergreen_11.4
Comment 12 Bernhard Wiedemann 2013-08-30 16:01:26 UTC
This is an autogenerated message for OBS integration:
This bug (829084) was mentioned in
https://build.opensuse.org/request/show/196913 Maintenance / 
https://build.opensuse.org/request/show/196916 Maintenance /
Comment 13 Roman Drahtmueller 2013-08-30 16:05:51 UTC
Dah... There were some duplicate submissions; they were removed, but the above looks much messier than it actually is.

Reassigning to security-team@suse.de for shipping+handling.
Comment 14 Swamp Workflow Management 2013-09-13 08:04:51 UTC
openSUSE-SU-2013:1435-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 677335,829084,830319
CVE References: CVE-2013-4115,CVE-2013-4123
Sources used:
openSUSE 12.3 (src):    squid-3.2.11-3.8.1
Comment 15 Swamp Workflow Management 2013-09-13 08:06:08 UTC
openSUSE-SU-2013:1436-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 677335,794954,796999,829084
CVE References: CVE-2012-5643,CVE-2013-0188,CVE-2013-0189,CVE-2013-4115
Sources used:
openSUSE 12.2 (src):    squid-2.7.STABLE9-9.4.1
Comment 16 Swamp Workflow Management 2013-09-13 08:07:54 UTC
openSUSE-SU-2013:1441-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 677335,829084
CVE References: CVE-2013-4115
Sources used:
openSUSE 12.2 (src):    squid3-3.1.23-2.8.1
Comment 17 Swamp Workflow Management 2013-09-13 16:04:58 UTC
openSUSE-SU-2013:1443-1: An update that fixes four vulnerabilities is now available.

Category: security (moderate)
Bug References: 677335,796999,829084
CVE References: CVE-2012-5643,CVE-2013-0188,CVE-2013-0189,CVE-2013-4115
Sources used:
openSUSE 11.4 (src):    squid-2.7.STABLE6-10.17.1
Comment 18 Swamp Workflow Management 2013-09-13 16:05:33 UTC
openSUSE-SU-2013:1444-1: An update that solves one vulnerability and has one errata is now available.

Category: security (moderate)
Bug References: 677335,829084
CVE References: CVE-2013-4115
Sources used:
openSUSE 11.4 (src):    squid3-3.1.23-19.1
Comment 19 Swamp Workflow Management 2013-09-19 09:04:20 UTC
Update released for: squid
Products:
SUSE-CORE 9-SP3-TERADATA (x86_64)
Comment 20 Swamp Workflow Management 2013-09-19 09:04:41 UTC
Update released for: squid, squid-debuginfo, squid-debugsource
Products:
SLE-SERVER 11-SP1-TERADATA (x86_64)
Comment 21 Swamp Workflow Management 2013-09-19 10:49:59 UTC
Update released for: squid, squid-debuginfo, squid-debugsource
Products:
SLE-DEBUGINFO 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLE-SERVER 11-SP3 (i386, ia64, ppc64, s390x, x86_64)
SLES4VMWARE 11-SP3 (i386, x86_64)
Comment 22 Swamp Workflow Management 2013-09-19 11:04:46 UTC
Update released for: squid, squid-debuginfo
Products:
SLE-SERVER 10-SP3-TERADATA (x86_64)
Comment 23 Swamp Workflow Management 2013-09-19 11:29:13 UTC
Update released for: squid, squid-debuginfo, squid-debugsource
Products:
SLE-DEBUGINFO 11-SP2 (i386, ia64, ppc64, s390x, x86_64)
SLE-SERVER 11-SP2 (i386, ia64, ppc64, s390x, x86_64)
SLES4VMWARE 11-SP2 (i386, x86_64)
Comment 24 Victor Pereira 2014-01-08 12:49:53 UTC
fixes released