Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Jul 2015 13:53:59 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r391703 - head/security/vuxml
Message-ID:  <201507101353.t6ADrxMj086120@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Fri Jul 10 13:53:58 2015
New Revision: 391703
URL: https://svnweb.freebsd.org/changeset/ports/391703

Log:
  Update squid entry to reflect new range of affected versions
  Still waiting on CVE assignment
  
  PR:		201374
  Security:	150d1538-23fa-11e5-a4a5-002590263bf5

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jul 10 13:32:26 2015	(r391702)
+++ head/security/vuxml/vuln.xml	Fri Jul 10 13:53:58 2015	(r391703)
@@ -402,37 +402,33 @@ Notes:
   </vuln>
 
   <vuln vid="150d1538-23fa-11e5-a4a5-002590263bf5">
-    <topic>squid -- multiple vulnerabilities</topic>
+    <topic>squid -- Improper Protection of Alternate Path with CONNECT requests</topic>
     <affects>
       <package>
 	<name>squid</name>
-	<range><ge>3.5</ge><lt>3.5.6</lt></range>
+	<range><lt>3.5.6</lt></range>
       </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>Amos Jeffries, Squid-3 release manager, reports:</p>
-	<blockquote cite="http://openwall.com/lists/oss-security/2015/07/06/8">;
-	  <p>Due to incorrect handling of peer responses in a hierarchy of 2 or
-	    more proxies remote clients (or scripts run on a client) are able to
-	    gain unrestricted access through a gateway proxy to its backend
-	    proxy.</p>
-	  <p>If the two proxies have differing levels of security this could
-	    lead to authentication bypass or unprivileged access to supposedly
-	    secure resources.</p>
-	  <p>Squid up to and including 3.5.5 are apparently vulnerable to DoS
-	    attack from malicious clients using repeated TLS renegotiation
-	    messages. This has not been verified as it also seems to require
-	    outdated (0.9.8l and older) OpenSSL libraries.</p>
+	<p>Squid security advisory 2015:2 reports:</p>
+	<blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2015_2.txt">;
+	  <p>Squid configured with cache_peer and operating on explicit proxy
+	    traffic does not correctly handle CONNECT method peer responses.</p>
+	  <p>The bug is important because it allows remote clients to bypass
+	    security in an explicit gateway proxy.</p>
+	  <p>However, the bug is exploitable only if you have configured
+	    cache_peer to receive CONNECT requests.</p>
 	</blockquote>
       </body>
     </description>
     <references>
-      <mlist>http://openwall.com/lists/oss-security/2015/07/06/8</mlist>;
+      <url>http://www.squid-cache.org/Advisories/SQUID-2015_2.txt</url>;
     </references>
     <dates>
       <discovery>2015-07-06</discovery>
       <entry>2015-07-06</entry>
+      <modified>2015-07-10</modified>
     </dates>
   </vuln>
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507101353.t6ADrxMj086120>