Squid 2.x / 3.x < 3.1.23 / 3.2.6 / 3.3.0.3 cachemgr.cgi DoS

medium Nessus Plugin ID 64501

Synopsis

The remote proxy server is affected by a denial of service vulnerability.

Description

According to its banner, the version of Squid running on the remote host is 2.x or 3.x prior to 3.1.23 / 3.2.6 / 3.3.0.3. The included 'cachemgr.cgi' tool reportedly lacks input validation, which could be abused by any client able to access that tool to perform a denial of service attack on the service host.

Note this fix is a result of an incomplete fix for CVE-2012-5643.
Further note that Nessus did not actually test for this issue, but instead has relied on the version in the server's banner.

Solution

Either upgrade to Squid version 3.1.23 / 3.2.6 / 3.3.0.3 or later, or apply the vendor-supplied patch.

Alternatively, restrict access to this CGI or limit CGI memory consumption via the host web server's configuration options.

See Also

http://www.squid-cache.org/Advisories/SQUID-2012_1.txt

Plugin Details

Severity: Medium

ID: 64501

File Name: squid_3_2_6.nasl

Version: 1.9

Type: remote

Family: Firewalls

Published: 2/8/2013

Updated: 9/17/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2013-0189

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Required KB Items: Settings/ParanoidReport, www/squid

Exploit Ease: No known exploits are available

Patch Publication Date: 1/1/2013

Vulnerability Publication Date: 12/17/2012

Reference Information

CVE: CVE-2012-5643, CVE-2013-0189

BID: 57646, 56957