Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090727161850.GB3400@redhat.com>
Date: Mon, 27 Jul 2009 10:18:50 -0600
From: Vincent Danen <vdanen@...hat.com>
To: oss-security@...ts.openwall.com
Subject: squid 3.x vulnerabilities

There are some security vulnerabilities in squid 3.x that have been
fixed today:

http://www.squid-cache.org/Advisories/SQUID-2009_2.txt

Specifically:

Due to incorrect buffer limits and related bound checks Squid
is vulnerable to a denial of service attack when processing
specially crafted requests or responses.

Due to incorrect data validation Squid is vulnerable to a denial
of service attack when processing specially crafted responses.



Patches are linked to from the advisory.

No CVE names look to be assigned; can we get some?  I think we probably
need two CVE names here.

Thanks.

-- 
Vincent Danen / Red Hat Security Response Team 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.