ALT-PU-2015-1383-1
Closed vulnerabilities
BDU:2015-11546
Уязвимость прокси-сервера Squid, позволяющая нарушителю обойти существующие ограничения и получить доступ к серверу
BDU:2016-00731
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00732
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00733
Уязвимость прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-9749
Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
- http://bugs.squid-cache.org/show_bug.cgi?id=4066
- http://bugs.squid-cache.org/show_bug.cgi?id=4066
- openSUSE-SU-2015:1835
- openSUSE-SU-2015:1835
- [oss-security] 20151001 CVE Request: squid: Nonce replay vulnerability in Digest authentication
- [oss-security] 20151001 CVE Request: squid: Nonce replay vulnerability in Digest authentication
- [oss-security] 20151011 Re: CVE Request: squid: Nonce replay vulnerability in Digest authentication
- [oss-security] 20151011 Re: CVE Request: squid: Nonce replay vulnerability in Digest authentication
- [oss-security] 20151012 Re: Re: CVE Request: squid: Nonce replay vulnerability in Digest authentication
- [oss-security] 20151012 Re: Re: CVE Request: squid: Nonce replay vulnerability in Digest authentication
Modified: 2024-11-21
CVE-2015-3455
Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.
- http://advisories.mageia.org/MGASA-2015-0191.html
- http://advisories.mageia.org/MGASA-2015-0191.html
- FEDORA-2016-7b40eb9e29
- FEDORA-2016-7b40eb9e29
- openSUSE-SU-2015:1546
- openSUSE-SU-2015:1546
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- RHSA-2015:2378
- RHSA-2015:2378
- MDVSA-2015:230
- MDVSA-2015:230
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74438
- 74438
- 1032221
- 1032221
- http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
- http://www.squid-cache.org/Advisories/SQUID-2015_1.txt
Modified: 2024-11-21
CVE-2015-5400
Squid before 3.5.6 does not properly handle CONNECT method peer responses when configured with cache_peer, which allows remote attackers to bypass intended restrictions and gain access to a backend proxy via a CONNECT request.
- FEDORA-2016-7b40eb9e29
- FEDORA-2016-7b40eb9e29
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3327
- DSA-3327
- [oss-security] 20150706 Squid HTTP proxy CVE request
- [oss-security] 20150706 Squid HTTP proxy CVE request
- [oss-security] 20150709 Re: Squid HTTP proxy CVE request
- [oss-security] 20150709 Re: Squid HTTP proxy CVE request
- [oss-security] 20150710 Re: Squid HTTP proxy CVE request
- [oss-security] 20150710 Re: Squid HTTP proxy CVE request
- [oss-security] 20150717 Re: Re: Squid HTTP proxy CVE request
- [oss-security] 20150717 Re: Re: Squid HTTP proxy CVE request
- 75553
- 75553
- 1032873
- 1032873
- http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
- http://www.squid-cache.org/Advisories/SQUID-2015_2.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch
- http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10494.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13225.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13856.patch
Modified: 2024-11-21
CVE-2016-2569
Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not properly append data to String objects, which allows remote servers to cause a denial of service (assertion failure and daemon exit) via a long string, as demonstrated by a crafted HTTP Vary header.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- RHSA-2016:2600
- RHSA-2016:2600
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- 1035101
- 1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13991.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14552.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14552.patch
- GLSA-201607-01
- GLSA-201607-01
- USN-3557-1
- USN-3557-1
Modified: 2024-11-21
CVE-2016-2570
The Edge Side Includes (ESI) parser in Squid 3.x before 3.5.15 and 4.x before 4.0.7 does not check buffer limits during XML parsing, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a crafted XML document, related to esi/CustomParser.cc and esi/CustomParser.h.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- RHSA-2016:2600
- RHSA-2016:2600
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- 1035101
- 1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13993.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13993.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14549.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14549.patch
- GLSA-201607-01
- GLSA-201607-01
- USN-3557-1
- USN-3557-1
Modified: 2024-11-21
CVE-2016-2571
http.cc in Squid 3.x before 3.5.15 and 4.x before 4.0.7 proceeds with the storage of certain data after a response-parsing failure, which allows remote HTTP servers to cause a denial of service (assertion failure and daemon exit) via a malformed response.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- RHSA-2016:2600
- RHSA-2016:2600
- DSA-3522
- DSA-3522
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- [oss-security] 20160226 Re: CVE request: Squid HTTP Caching Proxy multiple denial of service issues
- 1035101
- 1035101
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-13990.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-14548.patch
- USN-2921-1
- USN-2921-1
- GLSA-201607-01
- GLSA-201607-01
- USN-3557-1
- USN-3557-1