squid-3.5.20-17.el7.4

エラータID: AXSA:2020-558:03

Release date: 
Monday, October 5, 2020 - 08:40
Subject: 
squid-3.5.20-17.el7.4
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.

Security Fix(es):

* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810)

* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811)

* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528)

* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449)

* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450)

* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049)

* squid: Improper input validation could result in a DoS (CVE-2020-24606)

CVE-2019-12528
An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
CVE-2020-15049
An issue was discovered in http/ContentLengthInterpreter.cc in Squid before 4.12 and 5.x before 5.0.3. A Request Smuggling and Poisoning attack can succeed against the HTTP cache. The client sends an HTTP request with a Content-Length header containing "+\ "-" or an uncommon shell whitespace character prefix to the length field-value.
CVE-2020-15810
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Smuggling attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the proxy cache and any downstream caches with content from an arbitrary source. When configured for relaxed header parsing (the default), Squid relays headers containing whitespace characters to upstream servers. When this occurs as a prefix to a Content-Length header, the frame length specified will be ignored by Squid (allowing for a conflicting length to be used from another Content-Length header) but relayed upstream.
CVE-2020-15811
An issue was discovered in Squid before 4.13 and 5.x before 5.0.4. Due to incorrect data validation, HTTP Request Splitting attacks may succeed against HTTP and HTTPS traffic. This leads to cache poisoning. This allows any client, including browser scripts, to bypass local security and poison the browser cache and any downstream caches with content from an arbitrary source. Squid uses a string search instead of parsing the Transfer-Encoding header to find chunked encoding. This allows an attacker to hide a second request inside Transfer-Encoding: it is interpreted by Squid as chunked and split out into a second request delivered upstream. Squid will then deliver two distinct responses to the client, corrupting any downstream caches.
CVE-2020-24606
Squid before 4.13 and 5.x before 5.0.4 allows a trusted peer to perform Denial of Service by consuming all available CPU cycles during handling of a crafted Cache Digest response message. This only occurs when cache_peer is used with the cache digests feature. The problem exists because peerDigestHandleReply() livelocking in peer_digest.cc mishandles EOF.
CVE-2020-8449
An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
CVE-2020-8450
An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. squid-3.5.20-17.el7.4.src.rpm
    MD5: 8953b9740ffabf51e29204a39f7b379c
    SHA-256: 22b3ada8eccf6ddb5bc2269814072326e4c7ab76ef9a73be08bfe1ea3ae3f644
    Size: 2.33 MB

Asianux Server 7 for x86_64
  1. squid-3.5.20-17.el7.4.x86_64.rpm
    MD5: 5d863e1b4745cadc6e4bda26a4a341e2
    SHA-256: d085065a0449fbdae545ee571f4bd89cf9aee6126c76cc64212370a75566fda0
    Size: 3.13 MB
  2. squid-migration-script-3.5.20-17.el7.4.x86_64.rpm
    MD5: 11a098c97858019cb9e8bb4253c2ea1d
    SHA-256: 4d04edb13ea36b44a2768568abaccb7447258b56ff952f5306fa0e138ac9e8e6
    Size: 49.62 kB