ID CVE-2011-4096
Summary The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
References
Vulnerable Configurations
  • squid-cache.org Squid 3.1.0.5
    cpe:2.3:a:squid-cache:squid:3.1.0.5
  • squid-cache.org Squid 3.1.5.1
    cpe:2.3:a:squid-cache:squid:3.1.5.1
  • squid-cache.org Squid 3.1.5
    cpe:2.3:a:squid-cache:squid:3.1.5
  • squid-cache.org Squid 3.1.4
    cpe:2.3:a:squid-cache:squid:3.1.4
  • squid-cache.org Squid 3.1.3
    cpe:2.3:a:squid-cache:squid:3.1.3
  • squid-cache.org Squid 3.1.7
    cpe:2.3:a:squid-cache:squid:3.1.7
  • squid-cache.org Squid 3.1.6
    cpe:2.3:a:squid-cache:squid:3.1.6
  • squid-cache.org Squid 3.1.0.9
    cpe:2.3:a:squid-cache:squid:3.1.0.9
  • squid-cache.org Squid 3.1.0.8
    cpe:2.3:a:squid-cache:squid:3.1.0.8
  • squid-cache.org Squid 3.1.0.7
    cpe:2.3:a:squid-cache:squid:3.1.0.7
  • squid-cache.org Squid 3.1.0.6
    cpe:2.3:a:squid-cache:squid:3.1.0.6
  • squid-cache.org Squid 3.1.0.13
    cpe:2.3:a:squid-cache:squid:3.1.0.13
  • squid-cache.org Squid 3.1.0.14
    cpe:2.3:a:squid-cache:squid:3.1.0.14
  • squid-cache.org Squid 3.1.0.15
    cpe:2.3:a:squid-cache:squid:3.1.0.15
  • squid-cache.org Squid 3.1.0.10
    cpe:2.3:a:squid-cache:squid:3.1.0.10
  • squid-cache.org Squid 3.1.0.11
    cpe:2.3:a:squid-cache:squid:3.1.0.11
  • squid-cache.org Squid 3.1.0.16
    cpe:2.3:a:squid-cache:squid:3.1.0.16
  • squid-cache.org Squid 3.1.0.12
    cpe:2.3:a:squid-cache:squid:3.1.0.12
  • squid-cache.org Squid 3.1.0.17
    cpe:2.3:a:squid-cache:squid:3.1.0.17
  • squid-cache.org Squid 3.1.0.18
    cpe:2.3:a:squid-cache:squid:3.1.0.18
  • squid-cache.org Squid 3.1.1
    cpe:2.3:a:squid-cache:squid:3.1.1
  • squid-cache.org Squid 3.1.2
    cpe:2.3:a:squid-cache:squid:3.1.2
  • squid-cache.org Squid 3.1
    cpe:2.3:a:squid-cache:squid:3.1
  • squid-cache.org Squid 3.1.0.1
    cpe:2.3:a:squid-cache:squid:3.1.0.1
  • squid-cache.org Squid 3.1.0.2
    cpe:2.3:a:squid-cache:squid:3.1.0.2
  • squid-cache.org Squid 3.1.0.3
    cpe:2.3:a:squid-cache:squid:3.1.0.3
  • squid-cache.org Squid 3.1.0.4
    cpe:2.3:a:squid-cache:squid:3.1.0.4
  • squid-cache.org Squid 3.1.8
    cpe:2.3:a:squid-cache:squid:3.1.8
  • squid-cache.org Squid 3.1.9
    cpe:2.3:a:squid-cache:squid:3.1.9
  • squid-cache.org Squid 3.1.10
    cpe:2.3:a:squid-cache:squid:3.1.10
  • squid-cache.org Squid 3.1.11
    cpe:2.3:a:squid-cache:squid:3.1.11
  • squid-cache.org Squid 3.1.12
    cpe:2.3:a:squid-cache:squid:3.1.12
  • squid-cache.org Squid 3.1.13
    cpe:2.3:a:squid-cache:squid:3.1.13
  • squid-cache.org Squid 3.1.14
    cpe:2.3:a:squid-cache:squid:3.1.14
  • squid-cache.org Squid 3.1.15
    cpe:2.3:a:squid-cache:squid:3.1.15
  • squid-cache.org Squid 3.0.stable23
    cpe:2.3:a:squid-cache:squid:3.0.stable23
  • squid-cache.org Squid 3.0
    cpe:2.3:a:squid-cache:squid:3.0
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable1
    cpe:2.3:a:squid-cache:squid:3.0:-:stable1
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable11
    cpe:2.3:a:squid-cache:squid:3.0:-:stable11
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable10
    cpe:2.3:a:squid-cache:squid:3.0:-:stable10
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable2
    cpe:2.3:a:squid-cache:squid:3.0:-:stable2
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable12
    cpe:2.3:a:squid-cache:squid:3.0:-:stable12
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable4
    cpe:2.3:a:squid-cache:squid:3.0:-:stable4
  • squid-cache.org Squid 3.0.stable10
    cpe:2.3:a:squid-cache:squid:3.0.stable10
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable3
    cpe:2.3:a:squid-cache:squid:3.0:-:stable3
  • squid-cache.org Squid 3.0.stable11 release candidate 1
    cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable6
    cpe:2.3:a:squid-cache:squid:3.0:-:stable6
  • squid-cache.org Squid 3.0.stable21
    cpe:2.3:a:squid-cache:squid:3.0.stable21
  • squid-cache.org Squid 3.0.stable16 release candidate 1
    cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable5
    cpe:2.3:a:squid-cache:squid:3.0:-:stable5
  • squid-cache.org Squid 3.0.stable24
    cpe:2.3:a:squid-cache:squid:3.0.stable24
  • squid-cache.org Squid 3.0.stable22
    cpe:2.3:a:squid-cache:squid:3.0.stable22
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable8
    cpe:2.3:a:squid-cache:squid:3.0:-:stable8
  • squid-cache.org Squid 3.0.stable25
    cpe:2.3:a:squid-cache:squid:3.0.stable25
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable7
    cpe:2.3:a:squid-cache:squid:3.0:-:stable7
  • squid-cache.org Squid 3.0 PRE1
    cpe:2.3:a:squid-cache:squid:3.0:-:pre1
  • squid-cache.org Squid 3.0.stable17
    cpe:2.3:a:squid-cache:squid:3.0.stable17
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable9
    cpe:2.3:a:squid-cache:squid:3.0:-:stable9
  • squid-cache.org Squid 3.0.stable18
    cpe:2.3:a:squid-cache:squid:3.0.stable18
  • squid-cache.org Squid 3.0 PRE3
    cpe:2.3:a:squid-cache:squid:3.0:-:pre3
  • squid-cache.org Squid 3.0.stable19
    cpe:2.3:a:squid-cache:squid:3.0.stable19
  • squid-cache.org Squid 3.0 PRE2
    cpe:2.3:a:squid-cache:squid:3.0:-:pre2
  • squid-cache.org Squid 3.0.stable20
    cpe:2.3:a:squid-cache:squid:3.0.stable20
  • squid-cache.org Squid 3.0.stable14
    cpe:2.3:a:squid-cache:squid:3.0.stable14
  • squid-cache.org Squid 3.0.stable13
    cpe:2.3:a:squid-cache:squid:3.0.stable13
  • squid-cache.org Squid 3.0.stable16
    cpe:2.3:a:squid-cache:squid:3.0.stable16
  • squid-cache.org Squid 3.0.stable15
    cpe:2.3:a:squid-cache:squid:3.0.stable15
  • squid-cache.org Squid 3.0.stable9
    cpe:2.3:a:squid-cache:squid:3.0.stable9
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable13
    cpe:2.3:a:squid-cache:squid:3.0:-:stable13
  • squid-cache.org Squid 3.0.stable8
    cpe:2.3:a:squid-cache:squid:3.0.stable8
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable14
    cpe:2.3:a:squid-cache:squid:3.0:-:stable14
  • squid-cache.org Squid 3.0.stable12
    cpe:2.3:a:squid-cache:squid:3.0.stable12
  • cpe:2.3:a:squid-cache:squid:3.0:-:stable15
    cpe:2.3:a:squid-cache:squid:3.0:-:stable15
  • squid-cache.org Squid 3.0.stable11
    cpe:2.3:a:squid-cache:squid:3.0.stable11
  • squid-cache.org Squid 3.0 PRE7
    cpe:2.3:a:squid-cache:squid:3.0:-:pre7
  • squid-cache.org Squid 3.0.stable5
    cpe:2.3:a:squid-cache:squid:3.0.stable5
  • squid-cache.org Squid 3.0 PRE6
    cpe:2.3:a:squid-cache:squid:3.0:-:pre6
  • squid-cache.org Squid 3.0.stable4
    cpe:2.3:a:squid-cache:squid:3.0.stable4
  • squid-cache.org Squid 3.0 PRE5
    cpe:2.3:a:squid-cache:squid:3.0:-:pre5
  • squid-cache.org Squid 3.0.stable7
    cpe:2.3:a:squid-cache:squid:3.0.stable7
  • squid-cache.org Squid 3.0 PRE4
    cpe:2.3:a:squid-cache:squid:3.0:-:pre4
  • squid-cache.org Squid 3.0.stable6
    cpe:2.3:a:squid-cache:squid:3.0.stable6
  • cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11
    cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11
  • squid-cache.org Squid 3.0.stable1
    cpe:2.3:a:squid-cache:squid:3.0.stable1
  • squid-cache.org Squid 3.0 release candidate 4
    cpe:2.3:a:squid-cache:squid:3.0:rc4
  • squid-cache.org Squid 3.0.stable3
    cpe:2.3:a:squid-cache:squid:3.0.stable3
  • squid-cache.org Squid 3.0.stable2
    cpe:2.3:a:squid-cache:squid:3.0.stable2
CVSS
Base: 5.0 (as of 18-11-2011 - 12:31)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_SQUID3-111222.NASL
    description This update fixes the following security issue : - 727492: Invalid free by processing CNAME (CVE-2011-4096) This update also fixes the following non-security issue : - 737905: installation creates empty spurious file '/1'
    last seen 2018-11-13
    modified 2018-11-10
    plugin id 76031
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=76031
    title openSUSE Security Update : squid3 (openSUSE-SU-2012:0213-1)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2011-1791.NASL
    description An updated squid package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. (CVE-2011-4096) Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 57037
    published 2011-12-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57037
    title RHEL 6 : squid (RHSA-2011:1791)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2011-1791.NASL
    description From Red Hat Security Advisory 2011:1791 : An updated squid package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. (CVE-2011-4096) Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68401
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68401
    title Oracle Linux 6 : squid (ELSA-2011-1791)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-15233.NASL
    description Upstream bugfix update fixing invalid free on certain DNS responses Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 56863
    published 2011-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56863
    title Fedora 15 : squid-3.1.16-1.fc15 (2011-15233)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-2089-1.NASL
    description This update for squid3 fixes the following issues : - Multiple issues in pinger ICMP processing. (CVE-2014-7141, CVE-2014-7142) - CVE-2016-3947: Buffer overrun issue in pinger ICMPv6 processing. (bsc#973782) - CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010) - Fix multiple Denial of Service issues in HTTP Response processing. (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, bsc#968392, bsc#968393, bsc#968394, bsc#968395) - Regression caused by the DoS fixes above (bsc#993299) - CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783) - CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553) - CVE-2016-4052, CVE-2016-4053, CVE-2016-4054 : - fixes multiple issues in ESI processing (bsc#976556) - CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008) - CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715) - CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773) - Memory leak in squid3 when using external_acl (bsc#976708) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 93294
    published 2016-09-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93294
    title SUSE SLES11 Security Update : squid3 (SUSE-SU-2016:2089-1)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2381.NASL
    description It was discovered that the IPv6 support code in Squid does not properly handle certain DNS responses, resulting in deallocation of an invalid pointer and a daemon crash. The squid package and the version of Squid 3 shipped in lenny lack IPv6 support and are not affected by this issue.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57521
    published 2012-01-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57521
    title Debian DSA-2381-1 : squid3 - invalid memory deallocation
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2011-1791.NASL
    description An updated squid package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. (CVE-2011-4096) Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 57376
    published 2011-12-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57376
    title CentOS 6 : squid (CESA-2011:1791)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2011-15256.NASL
    description Upstream bugfix release fixing invalid free on certain DNS responses Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-12
    plugin id 56864
    published 2011-11-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56864
    title Fedora 14 : squid-3.1.16-1.fc14 (2011-15256)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_SQUID3-111222.NASL
    description This update fixes the following security issue : - 727492: Invalid free by processing CNAME (CVE-2011-4096) It also fixes the following non-security issue : - 737905: installation creates empty spurious file '/1'
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 57727
    published 2012-01-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57727
    title SuSE 11.1 Security Update : squid3 (SAT Patch Number 5583)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2016-1996-1.NASL
    description This update for squid3 fixes the following issues : - Multiple issues in pinger ICMP processing. (CVE-2014-7141, CVE-2014-7142) - CVE-2016-3947: Buffer overrun issue in pinger ICMPv6 processing. (bsc#973782) - CVE-2016-4554: fix header smuggling issue in HTTP Request processing (bsc#979010) - fix multiple Denial of Service issues in HTTP Response processing. (CVE-2016-2569, CVE-2016-2570, CVE-2016-2571, CVE-2016-2572, bsc#968392, bsc#968393, bsc#968394, bsc#968395) - CVE-2016-3948: Fix denial of service in HTTP Response processing (bsc#973783) - CVE-2016-4051: fixes buffer overflow in cachemgr.cgi (bsc#976553) - CVE-2016-4052, CVE-2016-4053, CVE-2016-4054 : - fixes multiple issues in ESI processing (bsc#976556) - CVE-2016-4556: fixes double free vulnerability in Esi.cc (bsc#979008) - CVE-2015-5400: Improper Protection of Alternate Path (bsc#938715) - CVE-2014-6270: fix off-by-one in snmp subsystem (bsc#895773) - Memory leak in squid3 when using external_acl (bsc#976708) Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-29
    plugin id 93271
    published 2016-09-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=93271
    title SUSE SLES11 Security Update : squid3 (SUSE-SU-2016:1996-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20111206_SQUID_ON_SL6_X.NASL
    description Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. An input validation flaw was found in the way Squid calculated the total number of resource records in the answer section of multiple name server responses. An attacker could use this flaw to cause Squid to crash. (CVE-2011-4096) Users of squid should upgrade to this updated package, which contains a backported patch to correct this issue. After installing this update, the squid service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61199
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61199
    title Scientific Linux Security Update : squid on SL6.x i386/x86_64
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201309-22.NASL
    description The remote host is affected by the vulnerability described in GLSA-201309-22 (Squid: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Squid. Please review the CVE identifiers referenced below for details. Impact : A remote attacker may be able to bypass ACL restrictions or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 70182
    published 2013-09-28
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=70182
    title GLSA-201309-22 : Squid: Multiple vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2011-193.NASL
    description A vulnerability has been discovered and corrected in squid : The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record (CVE-2011-4096). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 61941
    published 2012-09-06
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61941
    title Mandriva Linux Security Advisory : squid (MDVSA-2011:193)
  • NASL family Firewalls
    NASL id SQUID_3_1_16.NASL
    description According to its banner, the version of Squid is 3.1.x earlier than than 3.1.16 or 3.2.x earlier than 3.2.0.13. Such versions are affected by a denial of service vulnerability. The application does not properly free memory when handling DNS replies containing a CNAME record that references another CNAME record that contains an empty A record. Note that Nessus has relied only on the version in the proxy server's banner, which is not updated by the patch that the project has released to address the issue. If the patch has been applied properly and the service restarted, consider this to be a false positive.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 57287
    published 2011-12-14
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=57287
    title Squid 3.1.x < 3.1.16 / 3.2.x < 3.2.0.13 DNS Replies CName Record Parsing Remote DoS
redhat via4
advisories
bugzilla
id 750316
title CVE-2011-4096 squid: Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
oval
AND
  • comment squid is earlier than 7:3.1.10-1.el6_2.1
    oval oval:com.redhat.rhsa:tst:20111791005
  • comment squid is signed with Red Hat redhatrelease2 key
    oval oval:com.redhat.rhsa:tst:20110545006
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
rhsa
id RHSA-2011:1791
released 2011-12-06
severity Moderate
title RHSA-2011:1791: squid security update (Moderate)
rpms squid-7:3.1.10-1.el6_2.1
refmap via4
confirm http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html
mandriva MDVSA-2011:193
misc http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12
mlist
  • [oss-security] 20111031 CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
  • [oss-security] 20111031 Re: CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
sectrack 1026265
secunia
  • 46609
  • 47459
suse
  • SUSE-SU-2016:1996
  • SUSE-SU-2016:2089
Last major update 28-11-2016 - 14:07
Published 17-11-2011 - 14:55
Back to Top