[Japanese]

JVNDB-2015-000019

Squid input validation vulnerability

Overview

Squid contains a vulnerability where inputs are not properly validated.

Squid is a caching proxy server. Squid contains a vulnerability where server responses that contain invalid values in the Content-Length of the HTTP header are sent to the client.

Kazuho Oku reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Squid-cache.org
  • Squid versions prior to 3.1.1-STABLE

According to the developer, this vulnerability was addressed in 3.1.0.10-beta and that all stable Squid versions 3.1.x and later are not affected by this vulnerability.
Impact

If a HTTP response with a specially crafted header is processed, it may result in a HTTP response splitting attack.
Solution

[Apply an Update]
Apply the appropriate update for the version of the software being used.
Vendor Information

Squid-cache.org
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2015-0881
References

  1. JVN : JVN#64455813
  2. National Vulnerability Database (NVD) : CVE-2015-0881
Revision History

  • [2015/02/20]
      Web page was published
    [2015/02/24]
      References : Content was added
    [2015/03/06]
      Title was modified
      Overview was modified
      Affected Products : Product version was modified
      Solution was modified
      Vendor Information : Content was added