The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Squid: two vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of Squid.
Vulnerable software: Debian, Fedora, openSUSE Leap, RHEL, Squid, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this announce: 3/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 20/04/2016.
Références of this computer vulnerability: CERTFR-2016-AVI-141, CVE-2016-4051, CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, DLA-478-1, DLA-556-1, DSA-3625-1, FEDORA-2016-95edf19d8a, FEDORA-2016-b3b9407940, openSUSE-SU-2016:2081-1, RHSA-2016:1138-01, RHSA-2016:1139-01, RHSA-2016:1140-01, SQUID-2016:5, SQUID-2016:6, SUSE-SU-2016:1996-1, SUSE-SU-2016:2089-1, USN-2995-1, VIGILANCE-VUL-19423.

Description of the vulnerability 

Several vulnerabilities were announced in Squid.

An attacker can generate a buffer overflow in cachemgr.cgi, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-4051, SQUID-2016:5]

An attacker can generate a buffer overflow in Squid ESI, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2016-4052, CVE-2016-4053, CVE-2016-4054, SQUID-2016:6]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as Debian, Fedora, openSUSE Leap, RHEL, Squid, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity threat is important.

The trust level is of type confirmed by the editor, with an origin of intranet client.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

Squid: version 3.5.17.
The version 3.5.17 is fixed:
  http://www.squid-cache.org/Versions/v3/3.5/

Squid: patch.
A patch is available:
  http://www.squid-cache.org/Versions/v4/changesets/squid-4-14643.patch
  http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_5.patch
  http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_5.patch
  http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_5.patch
  http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_5.patch
And also:
  http://www.squid-cache.org/Versions/v4/changesets/squid-4-14648.patch
  http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14034.patch
  http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13235.patch
  http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12697.patch
  http://www.squid-cache.org/Versions/v3/3.2/changesets/squid-3.2-11841.patch

Debian 7: new squid3 packages.
New packages are available:
  Debian 7: squid3 3.1.20-2.2+deb7u6

Debian 8: new squid3 packages.
New packages are available:
  Debian 8: squid3 3.4.8-6+deb8u3

Fedora: new squid packages.
New packages are available:
  Fedora 23: squid 3.5.10-4.fc23
  Fedora 24: squid 3.5.19-2.fc24

openSUSE Leap 42.1: new squid packages.
New packages are available:
  openSUSE Leap 42.1: squid 3.3.14-6.1

RHEL: new squid packages.
New packages are available:
  RHEL 6: squid 3.1.23-16.el6_8.4, squid34 3.4.14-9.el6_8.3
  RHEL 7: squid 3.3.8-26.el7_2.3

SUSE LE 11 SP4: new squid3 packages.
New packages are available:
  SUSE LE 11 SP4: squid3 3.1.23-8.16.27.1
  SUSE LE 11 SP4: squid3 3.1.23-8.16.30.1
  SUSE LE 11 SP4: squid3 3.1.23-8.16.27.1

Ubuntu: new squid3 packages (10/06/2016).
New packages are available:
  Ubuntu 16.04 LTS: squid3 3.5.12-1ubuntu7.2
  Ubuntu 15.10: squid3 3.3.8-1ubuntu16.3
  Ubuntu 14.04 LTS: squid3 3.3.8-1ubuntu6.8
  Ubuntu 12.04 LTS: squid3 3.1.19-1ubuntu3.12.04.7
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computers vulnerabilities announce. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.