Squid < 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 HTTP Version Number Request Remote DoS

medium Nessus Plugin ID 35620

Synopsis

The remote proxy server is susceptible to a denial of service attack.

Description

The version of the Squid proxy caching server installed on the remote host may abort when parsing requests with an invalid HTTP version. A remote attacker may be able to leverage this issue to crash the application, thereby denying service to legitimate users.

Note that successful exploitation of this issue requires that Squid was not built with the 'NODEBUG' define.

Solution

Either apply the appropriate patches referenced in the project's advisory above or upgrade to Squid version 2.7.STABLE6 / 3.0.STABLE13 / 3.1.0.5 or later.

See Also

http://www.nessus.org/u?2415a098

http://www.nessus.org/u?49102613

Plugin Details

Severity: Medium

ID: 35620

File Name: squid_http_version_dos.nasl

Version: 1.17

Type: remote

Family: Firewalls

Published: 2/9/2009

Updated: 5/29/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2009-0478

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2009-0478

BID: 33604

CWE: 20

Secunia: 33731