Date: Fri, 10 Jul 2015 13:53:59 +0000 (UTC) From: Mark Felder <feld@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r391703 - head/security/vuxml Message-ID: <201507101353.t6ADrxMj086120@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: feld Date: Fri Jul 10 13:53:58 2015 New Revision: 391703 URL: https://svnweb.freebsd.org/changeset/ports/391703 Log: Update squid entry to reflect new range of affected versions Still waiting on CVE assignment PR: 201374 Security: 150d1538-23fa-11e5-a4a5-002590263bf5 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Jul 10 13:32:26 2015 (r391702) +++ head/security/vuxml/vuln.xml Fri Jul 10 13:53:58 2015 (r391703) @@ -402,37 +402,33 @@ Notes: </vuln> <vuln vid="150d1538-23fa-11e5-a4a5-002590263bf5"> - <topic>squid -- multiple vulnerabilities</topic> + <topic>squid -- Improper Protection of Alternate Path with CONNECT requests</topic> <affects> <package> <name>squid</name> - <range><ge>3.5</ge><lt>3.5.6</lt></range> + <range><lt>3.5.6</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Amos Jeffries, Squid-3 release manager, reports:</p> - <blockquote cite="http://openwall.com/lists/oss-security/2015/07/06/8"> - <p>Due to incorrect handling of peer responses in a hierarchy of 2 or - more proxies remote clients (or scripts run on a client) are able to - gain unrestricted access through a gateway proxy to its backend - proxy.</p> - <p>If the two proxies have differing levels of security this could - lead to authentication bypass or unprivileged access to supposedly - secure resources.</p> - <p>Squid up to and including 3.5.5 are apparently vulnerable to DoS - attack from malicious clients using repeated TLS renegotiation - messages. This has not been verified as it also seems to require - outdated (0.9.8l and older) OpenSSL libraries.</p> + <p>Squid security advisory 2015:2 reports:</p> + <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2015_2.txt"> + <p>Squid configured with cache_peer and operating on explicit proxy + traffic does not correctly handle CONNECT method peer responses.</p> + <p>The bug is important because it allows remote clients to bypass + security in an explicit gateway proxy.</p> + <p>However, the bug is exploitable only if you have configured + cache_peer to receive CONNECT requests.</p> </blockquote> </body> </description> <references> - <mlist>http://openwall.com/lists/oss-security/2015/07/06/8</mlist> + <url>http://www.squid-cache.org/Advisories/SQUID-2015_2.txt</url> </references> <dates> <discovery>2015-07-06</discovery> <entry>2015-07-06</entry> + <modified>2015-07-10</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507101353.t6ADrxMj086120>