dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.openwall.com/lists/oss-security/2010/08/25/6 | mailing-list x_refsource_MLIST |
| http://www.openwall.com/lists/oss-security/2010/08/24/7 | mailing-list x_refsource_MLIST |
| http://bugs.squid-cache.org/show_bug.cgi?id=3009 | x_refsource_CONFIRM |
| http://marc.info/?l=squid-users&m=128263555724981&w=2 | mailing-list x_refsource_MLIST |
| https://bugzilla.redhat.com/show_bug.cgi?id=626927 | x_refsource_CONFIRM |
| http://bugs.squid-cache.org/show_bug.cgi?id=3021 | x_refsource_CONFIRM |
| http://bazaar.launchpad.net/~squid/squid/3.1/revision/10072 | x_refsource_CONFIRM |
| http://bugs.gentoo.org/show_bug.cgi?id=334263 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2010/08/24/6 | mailing-list x_refsource_MLIST |
| http://www.openwall.com/lists/oss-security/2010/08/25/2 | mailing-list x_refsource_MLIST |
| http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-10072.patch | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
dns_internal.cc in Squid 3.1.6, when IPv6 DNS resolution is not enabled, accesses an invalid socket during an IPv4 TCP DNS query, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors that trigger an IPv4 DNS response with the TC bit set.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |