Rule

--
Sid
17208

--
Summary:
This event is generated when an attempt is made to exploit a known vulnerability in Squid.

--
Impact:
Denial of Service. Information disclosure. Loss of integrity. 

--
Detailed Information:
The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.

--
Affected Systems:
Squid-cache Squid 2.0
Squid-cache Squid 2.1
Squid-cache Squid 2.2
Squid-cache Squid 2.3
Squid-cache Squid 2.4
Squid-cache Squid 2.5
Squid-cache Squid 2.6
Squid-cache Squid 2.7
Squid-cache Squid 2.7
Squid-cache Squid 3.0
Squid-cache Squid 3.0.stable1
Squid-cache Squid 3.0.stable11
Squid-cache Squid 3.0.stable12
Squid-cache Squid 3.0.stable13
Squid-cache Squid 3.0.stable14
Squid-cache Squid 3.0.stable15
Squid-cache Squid 3.0.stable16
Squid-cache Squid 3.0.stable17
Squid-cache Squid 3.0.stable18
Squid-cache Squid 3.0.stable19
Squid-cache Squid 3.0.stable2
Squid-cache Squid 3.0.stable20
Squid-cache Squid 3.0.stable21
Squid-cache Squid 3.0.stable22
Squid-cache Squid 3.0.stable23
Squid-cache Squid 3.0.stable3
Squid-cache Squid 3.0.stable4
Squid-cache Squid 3.0.stable5
Squid-cache Squid 3.0.stable6
Squid-cache Squid 3.0.stable7
Squid-cache Squid 3.0.stable8
Squid-cache Squid 3.0.stable9

--
Attack Scenarios:


--
Ease of Attack:
Medium.

--
False Positives:
None known.

--
False Negatives:
None known.

--
Corrective Action:
Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

--
Contributors:
Sourcefire Vulnerability Research Team
This document was generated from data supplied by the National Vulnerability Database. A product of the National Institute of Standards and Technology.
For more information see http://nvd.nist.gov/

--
Additional References:

NIST CVE-2010-0639:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0639
  
--
