[squid-users] [ADVISORY] SQUID-2014:1 Denial of Service in SSL-Bump

From: Amos Jeffries <squid3_at_treenet.co.nz>
Date: Tue, 11 Mar 2014 17:09:51 +1300

__________________________________________________________________

    Squid Proxy Cache Security Update Advisory SQUID-2014:1
__________________________________________________________________

Advisory ID: SQUID-2014:1
Date: March 09, 2014
Summary: Denial of Service in SSL-Bump
Affected versions: Squid 3.1 -> 3.3.11,
                        Squid 3.4 -> 3.4.3
Fixed in version: Squid 3.3.12, 3.4.4
__________________________________________________________________

    http://www.squid-cache.org/Advisories/SQUID-2014_1.txt
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0128
__________________________________________________________________

Problem Description:

 Due to incorrect state management Squid is vulnerable to a denial
 of service attack when processing certain HTTPS requests.

__________________________________________________________________

Severity:

 This problem allows any client who can generate HTTPS requests
 to perform a denial of service attack on the Squid service.

 There are popular client software implementations which generate
 HTTPS requests and triggering this vulnerability during their
 normal activities.

__________________________________________________________________

Updated Packages:

 This bug is fixed by Squid versions 3.3.12 and 3.4.4.

 In addition, patches addressing this problem can be found in
 our patch archives.

Squid 3.3:
 <http://www.squid-cache.org/Versions/v3/3.3/changesets/squid-3.3-12677.patch>

Squid 3.4:
 <http://www.squid-cache.org/Versions/v3/3.4/changesets/squid-3.4-13104.patch>

 If you are using a prepackaged version of Squid then please refer
 to the package vendor for availability information on updated
 packages.

__________________________________________________________________

Determining if your version is vulnerable:

 All Squid versions without SSL-Bump feature configured are not
 vulnerable.

 All Squid-3.0 and older versions, including Squid-2 are not
 vulnerable.

 All unpatched Squid-3.1 versions are vulnerable.

 All unpatched Squid-3.2 versions are vulnerable.

 All unpatched Squid-3.3 versions up to and including 3.3.11 are
 vulnerable.

 All unpatched Squid-3.4 versions up to and including 3.4.3 are
 vulnerable.

__________________________________________________________________

Workarounds:

Either

 Disable SSL-bump for clients affected by adding "ssl_bump none"
 rule(s) at the top of the ssl_bump configuration directives.

Or

 Disable SSL-bump featrue completely by removing ssl-bump option
 from all http_port and/or https_port configuration directives.

Or

 Use TCP_RESET instead of all Squid-generated error pages.
 Note that this is only a partial workaround as some error pages
 cannot be overridden.

__________________________________________________________________

Contact details for the Squid project:

 For installation / upgrade support on binary packaged versions
 of Squid: Your first point of contact should be your binary
 package vendor.

 If your install and build Squid from the original Squid sources
 then the squid-users_at_squid-cache.org mailing list is your primary
 support point. For subscription details see
 <http://www.squid-cache.org/Support/mailing-lists.html>.

 For reporting of non-security bugs in the latest STABLE release
 the squid bugzilla database should be used
 <http://bugs.squid-cache.org/>.

 For reporting of security sensitive bugs send an email to the
 squid-bugs_at_squid-cache.org mailing list. It's a closed list
 (though anyone can post) and security related bug reports are
 treated in confidence until the impact has been established.

__________________________________________________________________

Credits:

 The vulnerability was reported by Mathias Fischer and Fabian
 Hugelshofer from Open Systems AG.

 Fixes by Alex Rousskov from The Measurement Factory.

__________________________________________________________________

Revision history:

 2014-02-21 16:04 GMT Initial Report
 2014-02-22 23:51 GMT Patch Provided
 2014-03-09 00:14 GMT Packages Released
__________________________________________________________________
END
Received on Tue Mar 11 2014 - 04:09:57 MDT

This archive was generated by hypermail 2.2.0 : Tue Mar 11 2014 - 12:00:04 MDT