CVE-2013-4115

NameCVE-2013-4115
DescriptionBuffer overflow in the idnsALookup function in dns_internal.cc in Squid 3.2 through 3.2.11 and 3.3 through 3.3.6 allows remote attackers to cause a denial of service (memory corruption and server termination) via a long name in a DNS lookup request.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs716743

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squid (PTS)buster4.6-1+deb10u7fixed
buster (security)4.6-1+deb10u10fixed
bullseye (security), bullseye4.13-10+deb11u2fixed
bookworm5.7-2fixed
sid, trixie6.6-1fixed
squid3 (PTS)jessie, jessie (lts)3.5.23-5+deb8u7fixed
stretch (security)3.5.23-5+deb9u7fixed
stretch (lts), stretch3.5.23-5+deb9u10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squidsource(unstable)(not affected)
squid3sourcesqueeze(not affected)
squid3sourcewheezy(not affected)
squid3source(unstable)3.3.8-1716743

Notes

- squid <not-affected> (Only affects 3.2 onwards)
[wheezy] - squid3 <not-affected> (Only affects 3.2 onwards)
[squeeze] - squid3 <not-affected> (Only affects 3.2 onwards)
http://www.squid-cache.org/Advisories/SQUID-2013_2.txt

Search for package or bug name: Reporting problems