Vigil@nce - Squid Proxy Cache: buffer overflow via HTTP request processing
July 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can generate a buffer overflow in the processing of
HTTP requests by Squid Proxy Cache, in order to trigger a denial
of service, and possibly to execute code.
Impacted products: MBS, MES, Squid
Severity: 2/4
Creation date: 12/07/2013
DESCRIPTION OF THE VULNERABILITY
Squid Proxy Cache is a applicative HTTP gateway with caching.
However, for some requests, the size of the data submited by the
client is not correctly checked. If the size of data is greater
than the size of the storage array, an overflow occurs in the
idnsALookup() function.
An attacker can therefore generate a buffer overflow in the
processing of HTTP requests by Squid Proxy Cache, in order to
trigger a denial of service, and possibly to execute code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN