Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1148

Опубликовано: 03 сент. 2014
Источник: oracle-oval
Платформа: Oracle Linux 5
Платформа: Oracle Linux 6

Описание

ELSA-2014-1148: squid security update (IMPORTANT)

[7:3.1.10-22]

  • Resolves: #1134936 - CVE-2013-4115 buffer overflow when processing overly long DNS names

[7:3.1.10-21]

  • Resolves: #1134936 - CVE-2014-3609 assertion failure in header processing

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

squid

2.6.STABLE21-7.el5_10

Oracle Linux x86_64

squid

2.6.STABLE21-7.el5_10

Oracle Linux i386

squid

2.6.STABLE21-7.el5_10

Oracle Linux 6

Oracle Linux x86_64

squid

3.1.10-22.el6_5

Oracle Linux i686

squid

3.1.10-22.el6_5

Связанные CVE

Связанные уязвимости

ubuntu
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

redhat
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

nvd
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.

debian
около 12 лет назад

Buffer overflow in the idnsALookup function in dns_internal.cc in Squi ...

ubuntu
почти 11 лет назад

HttpHdrRange.cc in Squid 3.x before 3.3.12 and 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via a request with crafted "Range headers with unidentifiable byte-range values."