Bugzilla – Bug 1185918
VUL-0: CVE-2021-28652: squid,squid3: SQUID-2021:3 Denial of Service issue in Cache Manager
Last modified: 2022-10-16 16:28:17 UTC
Due to an incorrect parser validation bug Squid is vulnerable to a Denial of Service attack against the Cache Manager API. Severity: This problem allows a trusted client to trigger memory leaks which over time lead to a Denial of Service against Squid and the machine it is operating on. This attack is limited to clients with Cache Manager API access privilege. CVSS Score of 7.8 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H/E:F/RL:O/RC:C/CR:X/IR:X/AR:H/MAV:N/MAC:H/MPR:H/MUI:N/MS:C/MC:X/MI:X/MA:H&version=3.1 Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-0003e3518dc95e4b5ab46b5140af79b22253048e.patch Squid 5: http://www.squid-cache.org/Versions/v5/changesets/squid-5-2db70e04723cedd19a90dba8b863ccbc2e708f8e.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. Determining if your version is vulnerable: Squid older than 3.5.28 have not been tested and should be assumed to be vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.4 are vulnerable. Workaround: Either, Disable Cache Manager access entirely if not needed. Place the following line in squid.conf before lines containing "allow" : http_access deny manager Or, Harden Cache Manager access privileges. For example; require authentication or other access controls in http_access beyond the default IP address restriction. Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the squid-users@lists.squid-cache.org mailing list is your primary support point. For subscription details see http://www.squid-cache.org/Support/mailing-lists.html. For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used http://bugs.squid-cache.org/. For reporting of security sensitive bugs send an email to the squid-bugs@lists.squid-cache.org mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Amos Jeffries of Treehouse Networks Ltd. Revision history: 2021-03-03 17:02:25 UTC Initial Report 2021-03-16 01:59:45 UTC Patch Released 2021-03-17 06:19:09 UTC CVE Assignment END
Affected packages: - SUSE:SLE-11-SP1:Update/squid3 3.1.23 - SUSE:SLE-12-SP2:Update/squid 3.5.21 - SUSE:SLE-12-SP5:Update/squid 4.13 - SUSE:SLE-15:Update/squid 4.13 - openSUSE:Factory/squid 4.14 Patch 4.x [0] Patch 5.x [1] [0] http://www.squid-cache.org/Versions/v4/changesets/squid-4-0003e3518dc95e4b5ab46b5140af79b22253048e.patch [1] http://www.squid-cache.org/Versions/v5/changesets/squid-5-2db70e04723cedd19a90dba8b863ccbc2e708f8e.patch
SUSE-SU-2021:1838-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): squid-4.15-4.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:1961-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: SUSE Manager Server 4.0 (src): squid-4.15-5.26.1 SUSE Manager Retail Branch Server 4.0 (src): squid-4.15-5.26.1 SUSE Manager Proxy 4.0 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server for SAP 15 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): squid-4.15-5.26.1 SUSE Enterprise Storage 6 (src): squid-4.15-5.26.1 SUSE CaaS Platform 4.0 (src): squid-4.15-5.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:1961-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: openSUSE Leap 15.3 (src): squid-4.15-5.26.1