Vulnerability Name:

CVE-2010-2951 (CCN-61374)

Assigned:2010-08-18
Published:2010-08-18
Updated:2010-10-13
Summary:dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CONFIRM
Type: Patch
http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072

Source: CONFIRM
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=334263

Source: CONFIRM
Type: UNKNOWN
http://bugs.squid-cache.org/show_bug.cgi?id=3009

Source: CCN
Type: SQUID-3021
Large DNS reply causes crash when no ipv6 resolver present

Source: CONFIRM
Type: UNKNOWN
http://bugs.squid-cache.org/show_bug.cgi?id=3021

Source: MITRE
Type: CNA
CVE-2010-2951

Source: MLIST
Type: Patch, Vendor Advisory
[squid-users] 20100824 Squid 3.1.7 is available

Source: CCN
Type: SA41090
Squid Long DNS Replies Denial of Service Vulnerability

Source: MLIST
Type: UNKNOWN
[oss-security] 20100824 CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present

Source: MLIST
Type: UNKNOWN
[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present

Source: MLIST
Type: Patch
[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present

Source: MLIST
Type: UNKNOWN
[oss-security] 20100825 Re: CVE Request -- Squid v3.1.6 -- DoS (crash) while processing large DNS replies with no IPv6 resolver present

Source: CCN
Type: OSVDB ID: 67618
Squid IPv4-only DNS Resolver Long DNS Reply Handling Remote DoS

Source: CCN
Type: BID-42645
Squid 'DNS' Reply Remote Denial of Service Vulnerability

Source: CONFIRM
Type: Patch
http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=626927

Source: XF
Type: UNKNOWN
squid-dns-replies-dos(61374)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    squid-cache squid 3.1.6
    squid-cache squid 3.1.5.1
    squid-cache squid 3.1.6