AnsweredAssumed Answered

Squid QID contradiction

Question asked by equalys user on Jun 8, 2015

Qualys has detected QID 62072 and QID 62071 on several RHEL 6 servers. The server is getting an authenticated scan, so Qualys is aware of the installed and running package. This is the latest package, per Red Hat.


# rpm -qa|grep squid

squid-3.1.10-29.el6.x86_64

 

# rpm -q --changelog squid | grep -i cve

- Resolves: #1134937 - CVE-2013-4115 buffer overflow when processing overly long DNS names

- Resolves: #1134937 - CVE-2014-3609 assertion failure in header processing

- Resolves: #1098135 - CVE-2014-0128 squid: denial of service when using

- Resolves: #888198 - CVE-2012-5643: improved upstream patch

- Resolves: #888198 - CVE-2012-5643: patch

- Resolves: #888198 - CVE-2012-5643: DoS (excessive resource consumption)

- Resolves: #755017 - CVE-2011-4096: Invalid free by processing CNAME DNS record

- Resolves: #735448 - CVE-2011-3205 squid: buffer overflow flaw in Squid's Gopher reply parser

- Resolves: #561743 - CVE-2010-0308 squid: temporary DoS (assertion failure) triggered by truncated DNS packet (SQUID-2010:1)

- fix for #171213 - CVE-2005-3258 Squid crash due to malformed FTP response

CVE-1999-0710 cachemgr malicious use

 

Results field from QID 62072:

Squid cachemgr.cgi Denial of Service Vulnerability detected on XXXX - squid/3.1.10#

 

Results field from QID 62071:

Detected on XXXX - squid/3.1.10#

 

See: https://rhn.redhat.com/errata/RHBA-2014-1446.html


Outcomes