ID CVE-2010-3072
Summary The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
References
Vulnerable Configurations
  • squid-cache.org Squid 3.0.stable1
    cpe:2.3:a:squid-cache:squid:3.0.stable1
  • squid-cache.org Squid 3.0.stable2
    cpe:2.3:a:squid-cache:squid:3.0.stable2
  • squid-cache.org Squid 3.0.stable3
    cpe:2.3:a:squid-cache:squid:3.0.stable3
  • squid-cache.org Squid 3.0.stable4
    cpe:2.3:a:squid-cache:squid:3.0.stable4
  • squid-cache.org Squid 3.0.stable5
    cpe:2.3:a:squid-cache:squid:3.0.stable5
  • squid-cache.org Squid 3.0.stable6
    cpe:2.3:a:squid-cache:squid:3.0.stable6
  • squid-cache.org Squid 3.0.stable7
    cpe:2.3:a:squid-cache:squid:3.0.stable7
  • squid-cache.org Squid 3.0.stable8
    cpe:2.3:a:squid-cache:squid:3.0.stable8
  • squid-cache.org Squid 3.0.stable9
    cpe:2.3:a:squid-cache:squid:3.0.stable9
  • squid-cache.org Squid 3.0.stable10
    cpe:2.3:a:squid-cache:squid:3.0.stable10
  • squid-cache.org Squid 3.0.stable11
    cpe:2.3:a:squid-cache:squid:3.0.stable11
  • squid-cache.org Squid 3.0.stable11 release candidate 1
    cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1
  • squid-cache.org Squid 3.0.stable12
    cpe:2.3:a:squid-cache:squid:3.0.stable12
  • squid-cache.org Squid 3.0.stable13
    cpe:2.3:a:squid-cache:squid:3.0.stable13
  • squid-cache.org Squid 3.0.stable14
    cpe:2.3:a:squid-cache:squid:3.0.stable14
  • squid-cache.org Squid 3.0.stable15
    cpe:2.3:a:squid-cache:squid:3.0.stable15
  • squid-cache.org Squid 3.0.stable16
    cpe:2.3:a:squid-cache:squid:3.0.stable16
  • squid-cache.org Squid 3.0.stable16 release candidate 1
    cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1
  • squid-cache.org Squid 3.0.stable17
    cpe:2.3:a:squid-cache:squid:3.0.stable17
  • squid-cache.org Squid 3.0.stable18
    cpe:2.3:a:squid-cache:squid:3.0.stable18
  • squid-cache.org Squid 3.0.stable19
    cpe:2.3:a:squid-cache:squid:3.0.stable19
  • squid-cache.org Squid 3.0.stable20
    cpe:2.3:a:squid-cache:squid:3.0.stable20
  • squid-cache.org Squid 3.0.stable21
    cpe:2.3:a:squid-cache:squid:3.0.stable21
  • squid-cache.org Squid 3.0.stable22
    cpe:2.3:a:squid-cache:squid:3.0.stable22
  • squid-cache.org Squid 3.0.stable23
    cpe:2.3:a:squid-cache:squid:3.0.stable23
  • squid-cache.org Squid 3.0.stable24
    cpe:2.3:a:squid-cache:squid:3.0.stable24
  • squid-cache.org Squid 3.0.stable25
    cpe:2.3:a:squid-cache:squid:3.0.stable25
  • squid-cache.org Squid 3.0
    cpe:2.3:a:squid-cache:squid:3.0
  • squid-cache.org Squid 3.1
    cpe:2.3:a:squid-cache:squid:3.1
  • squid-cache.org Squid 3.1.0.1
    cpe:2.3:a:squid-cache:squid:3.1.0.1
  • squid-cache.org Squid 3.1.0.2
    cpe:2.3:a:squid-cache:squid:3.1.0.2
  • squid-cache.org Squid 3.1.0.3
    cpe:2.3:a:squid-cache:squid:3.1.0.3
  • squid-cache.org Squid 3.1.0.4
    cpe:2.3:a:squid-cache:squid:3.1.0.4
  • squid-cache.org Squid 3.1.0.5
    cpe:2.3:a:squid-cache:squid:3.1.0.5
  • squid-cache.org Squid 3.1.0.6
    cpe:2.3:a:squid-cache:squid:3.1.0.6
  • squid-cache.org Squid 3.1.0.7
    cpe:2.3:a:squid-cache:squid:3.1.0.7
  • squid-cache.org Squid 3.1.0.8
    cpe:2.3:a:squid-cache:squid:3.1.0.8
  • squid-cache.org Squid 3.1.0.9
    cpe:2.3:a:squid-cache:squid:3.1.0.9
  • squid-cache.org Squid 3.1.0.10
    cpe:2.3:a:squid-cache:squid:3.1.0.10
  • squid-cache.org Squid 3.1.0.11
    cpe:2.3:a:squid-cache:squid:3.1.0.11
  • squid-cache.org Squid 3.1.0.12
    cpe:2.3:a:squid-cache:squid:3.1.0.12
  • squid-cache.org Squid 3.1.0.13
    cpe:2.3:a:squid-cache:squid:3.1.0.13
  • squid-cache.org Squid 3.1.0.14
    cpe:2.3:a:squid-cache:squid:3.1.0.14
  • squid-cache.org Squid 3.1.0.15
    cpe:2.3:a:squid-cache:squid:3.1.0.15
  • squid-cache.org Squid 3.1.0.16
    cpe:2.3:a:squid-cache:squid:3.1.0.16
  • squid-cache.org Squid 3.1.0.17
    cpe:2.3:a:squid-cache:squid:3.1.0.17
  • squid-cache.org Squid 3.1.0.18
    cpe:2.3:a:squid-cache:squid:3.1.0.18
  • squid-cache.org Squid 3.1.1
    cpe:2.3:a:squid-cache:squid:3.1.1
  • squid-cache.org Squid 3.1.2
    cpe:2.3:a:squid-cache:squid:3.1.2
  • squid-cache.org Squid 3.1.3
    cpe:2.3:a:squid-cache:squid:3.1.3
  • squid-cache.org Squid 3.1.4
    cpe:2.3:a:squid-cache:squid:3.1.4
  • squid-cache.org Squid 3.1.5
    cpe:2.3:a:squid-cache:squid:3.1.5
  • squid-cache.org Squid 3.1.5.1
    cpe:2.3:a:squid-cache:squid:3.1.5.1
  • squid-cache.org Squid 3.1.6
    cpe:2.3:a:squid-cache:squid:3.1.6
  • squid-cache.org Squid 3.1.7
    cpe:2.3:a:squid-cache:squid:3.1.7
CVSS
Base: 5.0 (as of 21-09-2010 - 09:44)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_1_SQUID3-101014.NASL
    description A remote trusted client can cause a NULL pointer dereference within squid to make it crash. (CVE-2010-3072: CVSS v2 Base Score: 5.0)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 50014
    published 2010-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50014
    title openSUSE Security Update : squid3 (openSUSE-SU-2010:0727-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-14222.NASL
    description - Upstream 3.1.8 bugfix release fixing SQUID-2010:3 denial of service issue. * Drop -fPIE compiler flag which resulted in inconsistent build and SELinux complaints. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 49242
    published 2010-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49242
    title Fedora 13 : squid-3.1.8-1.fc13 (2010-14222)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2010-14236.NASL
    description - Upstream 3.1.8 bugfix release fixing SQUID-2010:3 denial of service issue. * Drop -fPIE compiler flag which resulted in inconsistent build and SELinux complaints. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 49243
    published 2010-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49243
    title Fedora 12 : squid-3.1.8-1.fc12 (2010-14236)
  • NASL family Firewalls
    NASL id SQUID_3_1_8.NASL
    description According to its banner, the version of Squid is 3.x earlier than than 3.1.8, or 3.2.x earlier than 3.2.0.2. Such versions are potentially affected by a denial of service vulnerability caused by an internal error in string handling. A remote attacker, exploiting this flaw, could crash the affected service. Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by either of the patches the project has released to address the issue. If one of those has been applied properly and the service restarted, consider this to be a false positive.
    last seen 2019-02-21
    modified 2018-07-30
    plugin id 49693
    published 2010-09-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49693
    title Squid < 3.1.8 / 3.2.0.2 NULL Pointer Dereference Denial of Service
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2010-187.NASL
    description A vulnerability has been found and corrected in squid : The string-comparison functions in String.cci in Squid 3.x before 3.1.8 and 3.2.x before 3.2.0.2 allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request (CVE-2010-3072). Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=4 90 The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 49654
    published 2010-09-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49654
    title Mandriva Linux Security Advisory : squid (MDVSA-2010:187)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2111.NASL
    description Phil Oester discovered that Squid-3, a fully featured Web Proxy cache, is prone to a denial of service attack via a specially crafted request that includes empty strings.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 49277
    published 2010-09-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49277
    title Debian DSA-2111-1 : squid3 - denial of service
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-0545.NASL
    description An updated squid package that fixes one security issue and two bugs is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. It was found that string comparison functions in Squid did not properly handle the comparisons of NULL and empty strings. A remote, trusted web client could use this flaw to cause the squid daemon to crash via a specially crafted request. (CVE-2010-3072) This update also fixes the following bugs : * A small memory leak in Squid caused multiple 'ctx: enter level' messages to be logged to '/var/log/squid/cache.log'. This update resolves the memory leak. (BZ#666533) * This erratum upgrades Squid to upstream version 3.1.10. This upgraded version supports the Google Instant service and introduces various code improvements. (BZ#639365) Users of squid should upgrade to this updated package, which resolves these issues. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 54591
    published 2011-05-20
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54591
    title RHEL 6 : squid (RHSA-2011:0545)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_2_SQUID3-101014.NASL
    description A remote trusted client can cause a NULL pointer dereference within squid to make it crash. (CVE-2010-3072: CVSS v2 Base Score: 5.0)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 50020
    published 2010-10-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=50020
    title openSUSE Security Update : squid3 (openSUSE-SU-2010:0727-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_SQUID3-101014.NASL
    description A remote trusted client can cause a NULL pointer dereference within squid to make it crash. (CVE-2010-3072: CVSS v2 Base Score: 5.0)
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75746
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75746
    title openSUSE Security Update : squid3 (openSUSE-SU-2010:0727-1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_E4DAC715C81811DFA92C0015587E2CC1.NASL
    description Squid security advisory 2010:3 reports : Due to an internal error in string handling Squid is vulnerable to a denial of service attack when processing specially crafted requests. This problem allows any trusted client to perform a denial of service attack on the Squid service.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 49687
    published 2010-09-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=49687
    title FreeBSD : squid -- Denial of service vulnerability in request handling (e4dac715-c818-11df-a92c-0015587e2cc1)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-24 (Squid: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Squid. Please review the CVE identifiers referenced below for details. Impact : Remote unauthenticated attackers may be able to execute arbitrary code with the privileges of the Squid process or cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56658
    published 2011-10-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56658
    title GLSA-201110-24 : Squid: Multiple vulnerabilities
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20110519_SQUID_ON_SL6_X.NASL
    description Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. It was found that string comparison functions in Squid did not properly handle the comparisons of NULL and empty strings. A remote, trusted web client could use this flaw to cause the squid daemon to crash via a specially crafted request. (CVE-2010-3072) This update also fixes the following bugs : - A small memory leak in Squid caused multiple 'ctx: enter level' messages to be logged to '/var/log/squid/cache.log'. This update resolves the memory leak. (BZ#666533) - This erratum upgrades Squid to upstream version 3.1.10. This upgraded version supports the Google Instant service and introduces various code improvements. (BZ#639365) Users of squid should upgrade to this updated package, which resolves these issues. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61048
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61048
    title Scientific Linux Security Update : squid on SL6.x i386/x86_64
redhat via4
advisories
bugzilla
id 666533
title small memleak in squid-3.1.4
oval
AND
  • comment squid is earlier than 7:3.1.10-1.el6
    oval oval:com.redhat.rhsa:tst:20110545005
  • comment squid is signed with Red Hat redhatrelease2 key
    oval oval:com.redhat.rhsa:tst:20110545006
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhsa:tst:20100842001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhsa:tst:20100842002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhsa:tst:20100842003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhsa:tst:20100842004
rhsa
id RHSA-2011:0545
released 2011-05-19
severity Low
title RHSA-2011:0545: squid security and bug fix update (Low)
rpms squid-7:3.1.10-1.el6
refmap via4
bid 42982
confirm
debian DSA-2111
fedora
  • FEDORA-2010-14222
  • FEDORA-2010-14236
mlist
  • [oss-security] 20100905 CVE Request -- Squid -- Denial of service due internal error in string handling (SQUID-2010:3)
  • [oss-security] 20100907 Re: CVE Request -- Squid -- Denial of service due internal error in string handling (SQUID-2010:3)
secunia
  • 41298
  • 41477
  • 41534
suse SUSE-SR:2010:019
vupen ADV-2010-2433
Last major update 14-01-2011 - 01:46
Published 20-09-2010 - 17:00
Back to Top