Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 17 Dec 2012 12:27:36 -0500 (EST)
From: Jan Lieskovsky <>
Cc: "Steven M. Christey" <>
Subject: CVE Request -- SQUID-2012:1 / Squid:  DoS (excessive resource
 consumption) via invalid Content-Length headers or via memory leaks

Hello Kurt, Steve, vendors,

  A denial of service flaw was found in the way the CGI Cache Manager of the Squid proxy caching server
processed certain requests. A remote attacker could this this flaw to cause the squid service to consume
excessive amount of resources.


Upstream patches:
    (against the 3.1 branch)
    (against the 3.2 branch)

Could you allocate a CVE id for this?

Thank you && Regards, Jan.
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ