ALAS-2014-433


Amazon Linux AMI Security Advisory: ALAS-2014-433
Advisory Release Date: 2014-10-22 13:20 Pacific
Severity: Important

Issue Overview:

A flaw was found in the way Squid handled malformed HTTP Range headers. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2014-3609 )

A buffer overflow flaw was found in Squid's DNS lookup module. A remote attacker able to send HTTP requests to the Squid proxy could use this flaw to crash Squid. (CVE-2013-4115 )

Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management. (CVE-2014-0128 )


Affected Packages:

squid


Issue Correction:
Run yum update squid to update your system.

New Packages:
i686:
    squid-3.1.10-29.17.amzn1.i686
    squid-debuginfo-3.1.10-29.17.amzn1.i686

src:
    squid-3.1.10-29.17.amzn1.src

x86_64:
    squid-3.1.10-29.17.amzn1.x86_64
    squid-debuginfo-3.1.10-29.17.amzn1.x86_64