Amazon Linux 1 Security Advisory: ALAS-2014-433
Advisory Release Date: 2014-10-22 20:04 Pacific
Advisory Updated Date: 2014-10-22 13:20 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609)
A buffer overflow flaw was found in Squid's DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115)
Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management. (CVE-2014-0128)
Affected Packages:
squid
Issue Correction:
Run yum update squid to update your system.
i686:
squid-3.1.10-29.17.amzn1.i686
squid-debuginfo-3.1.10-29.17.amzn1.i686
src:
squid-3.1.10-29.17.amzn1.src
x86_64:
squid-3.1.10-29.17.amzn1.x86_64
squid-debuginfo-3.1.10-29.17.amzn1.x86_64