ID CVE-2010-2951
Summary dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.
References
Vulnerable Configurations
  • cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 13-10-2010 - 04:00)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
confirm
mlist
  • [oss-security] 20100824 CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present
  • [oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present
  • [squid-users] 20100824 Squid 3.1.7 is available
Last major update 13-10-2010 - 04:00
Published 12-10-2010 - 21:00
Last modified 13-10-2010 - 04:00
Back to Top