| Severity |
|
| Remote |
|
| Type |
| - |
Unknown |
| + |
Denial of service |
|
| Description |
| + |
Due to a buffer management bug Squid before version 4.15 is vulnerable to a denial of service attack against the server it is operating on. This attack is limited to proxies which attempt to resolve a "urn:" resource identifier. Support for this resolving is enabled by default in all Squid. |
|
| References |
| + |
https://github.com/squid-cache/squid/security/advisories/GHSA-ch36-9jhx-phm4 |
| + |
http://www.squid-cache.org/Versions/v4/changesets/squid-4-a975fd5aedc866629214aaaccb38376855351899.patch |
|
| Notes |
| + |
Workaround |
| + |
========== |
| + |
|
| + |
The issue can be mitigated by disabling URN processing by the proxy, by adding these lines to squid.conf: |
| + |
|
| + |
acl URN proto URN |
| + |
http_access deny URN |
|