Bugzilla – Bug 1185919
VUL-0: CVE-2021-28662: squid,squid3: SQUID-2021:2 Denial of Service in HTTP Response Processing
Last modified: 2022-10-18 09:39:03 UTC
Due to an input validation bug Squid is vulnerable to a Denial of Service against all clients using the proxy. Severity: This problem allows a remote server to perform Denial of Service when delivering HTTP Response messages. The issue trigger is a header which can be expected to exist in HTTP traffic without any malicious intent by the server. CVSS Score of 7.9 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:X/RL:O/RC:C/CR:X/IR:X/AR:H/MAV:N/MAC:L/MPR:N/MUI:R/MS:U/MC:N/MI:N/MA:H&version=3.1 Updated Packages: This bug is fixed by Squid versions 4.15 and 5.0.6. In addition, patches addressing this problem for the stable releases can be found in our patch archives: Squid 4: http://www.squid-cache.org/Versions/v4/changesets/squid-4-b1c37c9e7b30d0efb5e5ccf8200f2a646b9c36f8.patch If you are using a prepackaged version of Squid then please refer to the package vendor for availability information on updated packages. Determining if your version is vulnerable: All Squid older than 4.0 are not vulnerable. All Squid-4.x up to and including 4.14 are vulnerable. All Squid-5.x up to and including 5.0.5 are vulnerable. Workaround: There are no known workarounds for this vulnerability. Contact details for the Squid project: For installation / upgrade support on binary packaged versions of Squid: Your first point of contact should be your binary package vendor. If you install and build Squid from the original Squid sources then the squid-users@lists.squid-cache.org mailing list is your primary support point. For subscription details see http://www.squid-cache.org/Support/mailing-lists.html. For reporting of non-security bugs in the latest STABLE release the squid bugzilla database should be used http://bugs.squid-cache.org/. For reporting of security sensitive bugs send an email to the squid-bugs@lists.squid-cache.org mailing list. It's a closed list (though anyone can post) and security related bug reports are treated in confidence until the impact has been established. Credits: This vulnerability was discovered by Joshua Rogers of Opera Software. Fixed by Alex Rousskov of The Measurement Factory. Revision history: 2021-03-08 19:45:14 UTC Initial Report 2021-03-16 15:45:11 UTC Patch Released 2021-03-18 01:33:50 UTC CVE Allocation END
Affected packages: - SUSE:SLE-12-SP5:Update/squid 4.13 - SUSE:SLE-15:Update/squid 4.13 - openSUSE:Factory/squid 4.14 Patch 4.x [0] [0] http://www.squid-cache.org/Versions/v4/changesets/squid-4-b1c37c9e7b30d0efb5e5ccf8200f2a646b9c36f8.patch
SUSE-SU-2021:1838-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: SUSE Linux Enterprise Server 12-SP5 (src): squid-4.15-4.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2021:1961-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: SUSE Manager Server 4.0 (src): squid-4.15-5.26.1 SUSE Manager Retail Branch Server 4.0 (src): squid-4.15-5.26.1 SUSE Manager Proxy 4.0 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server for SAP 15-SP1 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server for SAP 15 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-SP1-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-SP1-BCL (src): squid-4.15-5.26.1 SUSE Linux Enterprise Server 15-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise Module for Server Applications 15-SP3 (src): squid-4.15-5.26.1 SUSE Linux Enterprise Module for Server Applications 15-SP2 (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-LTSS (src): squid-4.15-5.26.1 SUSE Linux Enterprise High Performance Computing 15-ESPOS (src): squid-4.15-5.26.1 SUSE Enterprise Storage 6 (src): squid-4.15-5.26.1 SUSE CaaS Platform 4.0 (src): squid-4.15-5.26.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
openSUSE-SU-2021:0879-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: openSUSE Leap 15.2 (src): squid-4.15-lp152.2.9.1
openSUSE-SU-2021:1961-1: An update that solves 5 vulnerabilities and has three fixes is now available. Category: security (important) Bug References: 1171164,1171569,1183436,1185916,1185918,1185919,1185921,1185923 CVE References: CVE-2020-25097,CVE-2021-28651,CVE-2021-28652,CVE-2021-28662,CVE-2021-31806 JIRA References: Sources used: openSUSE Leap 15.3 (src): squid-4.15-5.26.1