CERTA-2009-AVI-298
Vulnerability from certfr_avis - Published: 2009-07-28 - Updated: 2009-07-28
Deux vulnérabilités présentes dans Squid permettent à un utilisateur distant de provoquer un déni de service.
Description
Deux vulnérabilités sont présentes dans Squid :
- la première concerne le traitement des en-têtes HTTP contenues dans les requêtes ou les réponses reçues par Squid ;
- la seconde est relative à un manque de contrôle par Squid dans le traitement des réponses HTTP.
Ces deux failles permettent à un utilisateur distant malintentionné de provoquer un déni de service de l'application vulnérable.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Squid versions 3.0.STABLE16 et ant\u00e9rieures ;",
"product": {
"name": "Squid",
"vendor": {
"name": "Squid",
"scada": false
}
}
},
{
"description": "Squid versions 3.1.0.11 et ant\u00e9rieures.",
"product": {
"name": "Squid",
"vendor": {
"name": "Squid",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDeux vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans Squid :\n\n- la premi\u00e8re concerne le traitement des en-t\u00eates HTTP contenues dans\n les requ\u00eates ou les r\u00e9ponses re\u00e7ues par Squid ;\n- la seconde est relative \u00e0 un manque de contr\u00f4le par Squid dans le\n traitement des r\u00e9ponses HTTP.\n\nCes deux failles permettent \u00e0 un utilisateur distant malintentionn\u00e9 de\nprovoquer un d\u00e9ni de service de l\u0027application vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2009-07-28T00:00:00",
"last_revision_date": "2009-07-28T00:00:00",
"links": [
{
"title": "Site de Squid :",
"url": "http://www.squid-cache.org"
}
],
"reference": "CERTA-2009-AVI-298",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-07-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Deux vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans Squid permettent \u00e0 un utilisateur\ndistant de provoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Squid",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SQUID-2009_2 du 27 juillet 2009",
"url": "http://www.squid-cache.org/Advisories/SQUID-2009_2.txt"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…