- -------------------------------------------------------------------------
Debian Security Advisory DSA-3139-1                   security@debian.org
http://www.debian.org/security/                        Sebastien Delafond
January 25, 2015                       http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : squid
CVE ID         : CVE-2014-3609
Debian Bug     : 776194

Matthew Daley discovered that squid, a web proxy cache, does not
properly perform input validation when parsing requests. A remote
attacker could use this flaw to mount a denial of service attack, by
sending specially crafted Range requests.

For the stable distribution (wheezy), this problem has been fixed in
version 2.7.STABLE9-4.1+deb7u1.

We recommend that you upgrade your squid packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Debian: DSA-3139-1: squid security update

January 25, 2015
Matthew Daley discovered that squid, a web proxy cache, does not properly perform input validation when parsing requests

Summary

For the stable distribution (wheezy), this problem has been fixed in
version 2.7.STABLE9-4.1+deb7u1.

We recommend that you upgrade your squid packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org

Severity
Matthew Daley discovered that squid, a web proxy cache, does not
properly perform input validation when parsing requests. A remote
attacker could use this flaw to mount a denial of service attack, by
sending specially crafted Range requests.

Related News