svn commit: r462696 - head/security/vuxml
Danilo G. Baio
dbaio at FreeBSD.org
Fri Feb 23 13:25:15 UTC 2018
Author: dbaio
Date: Fri Feb 23 13:25:10 2018
New Revision: 462696
URL: https://svnweb.freebsd.org/changeset/ports/462696
Log:
security/vuxml: Document vulnerabilities in www/squid
Security: CVE-2018-1000024
Security: CVE-2018-1000027
PR: 226138
Submitted by: Yasuhiro KIMURA <yasu at utahime.org>
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Feb 23 13:11:27 2018 (r462695)
+++ head/security/vuxml/vuln.xml Fri Feb 23 13:25:10 2018 (r462696)
@@ -58,6 +58,58 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d5b6d151-1887-11e8-94f7-9c5c8e75236a">
+ <topic>squid -- Vulnerable to Denial of Service attack</topic>
+ <affects>
+ <package>
+ <name>squid</name>
+ <range><lt>3.5.27_3</lt></range>
+ </package>
+ <package>
+ <name>squid-devel</name>
+ <range><lt>4.0.23</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Louis Dion-Marcil reports:</p>
+ <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2018_1.txt">
+ <p>Due to incorrect pointer handling Squid is vulnerable to denial
+ of service attack when processing ESI responses.</p>
+ <p>This problem allows a remote server delivering certain ESI
+ response syntax to trigger a denial of service for all clients
+ accessing the Squid service.</p>
+ <p>Due to unrelated changes Squid-3.5 has become vulnerable to some
+ regular ESI server responses also triggering this issue.</p>
+ <p>This problem is limited to the Squid custom ESI parser.
+ Squid built to use libxml2 or libexpat XML parsers do not have
+ this problem.</p>
+ </blockquote>
+ <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2018_2.txt">
+ <p>Due to incorrect pointer handling Squid is vulnerable to denial
+ of service attack when processing ESI responses or downloading
+ intermediate CA certificates.</p>
+ <p>This problem allows a remote client delivering certain HTTP
+ requests in conjunction with certain trusted server responses to
+ trigger a denial of service for all clients accessing the Squid
+ service.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.squid-cache.org/Advisories/SQUID-2018_1.txt</url>
+ <url>http://www.squid-cache.org/Advisories/SQUID-2018_2.txt</url>
+ <cvename>CVE-2018-1000024</cvename>
+ <cvename>CVE-2018-1000027</cvename>
+ <url>https://www.debian.org/security/2018/dsa-4122</url>
+ <freebsdpr>ports/226138</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2017-12-13</discovery>
+ <entry>2018-02-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="933654ce-17b8-11e8-90b8-001999f8d30b">
<topic>asterisk -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list