Squid: Denial of Service through DNS responses — GLSA 200502-25

Squid contains a bug in the handling of certain DNS responses resulting in a Denial of Service.

Affected packages

net-proxy/squid on all architectures
Affected versions < 2.5.8
Unaffected versions >= 2.5.8

Background

Squid is a full-featured Web proxy cache designed to run on Unix-like systems. It supports proxying and caching of HTTP, FTP, and other protocols, as well as SSL support, cache hierarchies, transparent caching, access control lists and many other features.

Description

Handling of certain DNS responses trigger assertion failures.

Impact

By returning a specially crafted DNS response an attacker could cause Squid to crash by triggering an assertion failure.

Workaround

There is no known workaround at this time.

Resolution

All Squid users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.8"

References

Release date
February 18, 2005

Latest revision
February 18, 2005: 01

Severity
normal

Exploitable
remote

Bugzilla entries