diff options
author | junovitch <junovitch@FreeBSD.org> | 2016-02-24 19:46:09 +0800 |
---|---|---|
committer | junovitch <junovitch@FreeBSD.org> | 2016-02-24 19:46:09 +0800 |
commit | 2671a3b02d430c85753f04cd6b55d696c173e6be (patch) | |
tree | 7eb7ab186377f3551d5737b6b89f7bf729a1eeea /security | |
parent | 70539c8655ac19f4ea8e0ccd40cebc54c3aa4bde (diff) | |
download | freebsd-ports-gnome-2671a3b02d430c85753f04cd6b55d696c173e6be.tar.gz freebsd-ports-gnome-2671a3b02d430c85753f04cd6b55d696c173e6be.tar.zst freebsd-ports-gnome-2671a3b02d430c85753f04cd6b55d696c173e6be.zip |
Document squid remote DoS in HTTP response processing
PR: 207454
Reported by: Pavel Timofeev <timp87@gmail.com>
Security: https://vuxml.FreeBSD.org/freebsd/660ebbf5-daeb-11e5-b2bd-002590263bf5.html
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 91979db93819..44ecfdf57081 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,38 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="660ebbf5-daeb-11e5-b2bd-002590263bf5"> + <topic>squid -- remote DoS in HTTP response processing</topic> + <affects> + <package> + <name>squid</name> + <range><lt>3.5.15</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Amos Jeffries reports:</p> + <blockquote cite="http://www.openwall.com/lists/oss-security/2016/02/24/12"> + <p>The proxy contains a String object class with 64KB content limits. + Some code paths do not bounds check before appending to these + String and overflow leads to an assertion which terminates all + client transactions using the proxy, including those unrelated to + the limit being exceeded.</p> + <p>Error handling for malformed HTTP responses can lead to a second + assertion with the same effects as the first issue.</p> + </blockquote> + </body> + </description> + <references> + <freebsdpr>ports/207454</freebsdpr> + <url>http://www.openwall.com/lists/oss-security/2016/02/24/12</url> + </references> + <dates> + <discovery>2016-02-24</discovery> + <entry>2016-02-24</entry> + </dates> + </vuln> + <vuln vid="9e5bbffc-d8ac-11e5-b2bd-002590263bf5"> <topic>bsh -- remote code execution vulnerability</topic> <affects> |