Debian DSA-3745-1 : squid3 - security update

high Nessus Plugin ID 96102

Synopsis

The remote Debian host is missing a security-related update.

Description

Saulius Lapinskas from Lithuanian State Social Insurance Fund Board discovered that Squid3, a fully featured web proxy cache, does not properly process responses to If-None-Modified HTTP conditional requests, leading to client-specific Cookie data being leaked to other clients. A remote attacker can take advantage of this flaw to discover private and sensitive information about another clients browsing session.

Solution

Upgrade the squid3 packages.

For the stable distribution (jessie), this problem has been fixed in version 3.4.8-6+deb8u4. In addition, this update includes a fix for \#819563.

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848493

https://packages.debian.org/source/jessie/squid3

https://www.debian.org/security/2016/dsa-3745

Plugin Details

Severity: High

ID: 96102

File Name: debian_DSA-3745.nasl

Version: 3.10

Type: local

Agent: unix

Published: 12/27/2016

Updated: 1/11/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:squid3, cpe:/o:debian:debian_linux:8.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/24/2016

Reference Information

CVE: CVE-2016-10002

DSA: 3745