[Security Announce] [ MDVSA-2015:103 ] squid

Fabricante: Mandriva
Fecha: 29/03/2015
Identificador: MDVSA-2015:103
[Security Announce] [ MDVSA-2015:103 ] squid
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:103 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : squid Date : March 29, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated squid packages fix security vulnerabilities: Due to incorrect state management, Squid before 3.3.12 is vulnerable to a denial of service attack when processing certain HTTPS requests if the SSL-Bump feature is enabled (CVE-2014-0128). Matthew Daley discovered that Squid 3 did not properly perform input validation in request parsing. A remote attacker could send crafted Range requests to cause a denial of service (CVE-2014-3609). Due to incorrect buffer management Squid can be caused by an attacker to write outside its allocated SNMP buffer (CVE-2014-6270). Due to incorrect bounds checking Squid pinger binary is vulnerable to denial of service or information leak attack when processing larger than normal ICMP or ICMPv6 packets (CVE-2014-7141). Due to incorrect input validation Squid pinger binary is vulnerable to denial of service or information leak attacks when processing ICMP or ICMPv6 packets (CVE-2014-7142). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3609 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6270 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7141 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7142 http://advisories.mageia.org/MGASA-2014-0168.html http://advisories.mageia.org/MGASA-2014-0369.html http://advisories.mageia.org/MGASA-2014-0396.html _______________________________________________________________________ Updated Packages: Mandriva Business Server 2/X86_64: 071db3614e124eb1b387c264968d2ff9 mbs2/x86_64/squid-3.3.13-1.mbs2.x86_64.rpm d7e3f39404d20077be8ac0c073fecf08 mbs2/x86_64/squid-cachemgr-3.3.13-1.mbs2.x86_64.rpm 172d9eb494509cb443fb772cbbc0a0ef mbs2/SRPMS/squid-3.3.13-1.mbs2.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/en/support/security/advisories/ If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iD8DBQFVF35qmqjQ0CJFipgRAv8VAJ9RvVsprYr9T+jRbhrNzzqgUfUX9QCgmqAr 4GKmB9QQ7JpPgxndOeJz3mI= =VVLp -----END PGP SIGNATURE-----