Your submission was sent successfully! Close

CVE-2014-0128

Published: 14 April 2014

Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.

Priority

Negligible

Status

Package Release Status
squid3
Launchpad, Ubuntu, Debian
Upstream
Released (3.3.12, 3.4.4)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (3.5.12-1ubuntu6)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [3.3.8-1ubuntu6.6])
Patches:
Upstream: http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12677.patch (3.3)
Upstream: http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13104.patch

Notes

AuthorNote
seth-arnold
Flaw requires building the package with --enable-ssl; this flag is
not used in Debian nor Ubuntu's builds.
mdeslaur
However, we should probably fix this anyway as rebuilding
the Ubuntu package locally to enable ssl is a common scenario.

References

Bugs