[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] Re: CVE Request -- Squid v3.1.6 -- DoS (crash)
From: Josh Bressers <bressers () redhat ! com>
Date: 2010-08-25 14:24:50
Message-ID: 448348997.262011282746290470.JavaMail.root () zmail01 ! collab ! prod ! int ! phx2 ! redhat ! com
[Download RAW message or body]
Please use CVE-2010-2951 for this.
Thanks.
--
JB
----- "Stephen Thorne" <stephen@thorne.id.au> wrote:
> On 2010-08-24, Jan Lieskovsky wrote:
> > Stephen Thorne reported a buffer overread flaw in the way Squid
> proxy caching server
> > processed large DNS replies in cases, when no IPv6 resolver was
> present.
> > A remote attacker could provide DNS reply with large amount of
> data,
> > leading to denial of service (squid server crash).
>
> Those references all look correct, but I have one small niggle, this
> was not a
> buffer overread flaw.
>
> What actually happens is that if a TCP DNS request is required, a
> logic error
> causes a sockopt to be set on the ipv6 resolver fd, which will be
> fatal if that
> resolver is not configured.
>
> --
> Regards,
> Stephen Thorne
> Development Engineer
> Netbox Blue
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic