Vulnerability Details : CVE-2010-0308
lib/rfc1035.c in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15 allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2010-0308
- cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable22:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable15:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable14:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable21:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable20:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable13:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable12:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable19:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable18:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable11:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable9:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable17:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable16:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable8:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable7:*:*:*:*:*:*:*
Threat overview for CVE-2010-0308
Top countries where our scanners detected CVE-2010-0308
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-0308 119
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-0308!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-0308
19.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0308
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:N/A:P |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2010-0308
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2010-0308
-
Red Hat 2010-03-31Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-0308 This issue was addressed in the squid packages as shipped with Red Hat Enterprise Linux 5 via: https://rhn.redhat.com/errata/RHSA-2010-0221.html The Red Hat Security Response Team has rated this issue as having low security impact, a future squid update may address this flaw in Red Hat Enterprise Linux 3 and 4.
References for CVE-2010-0308
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11270
Repository / Oval Repository
-
http://events.ccc.de/congress/2009/Fahrplan/attachments/1483_26c3_ipv4_fuckups.pdf
-
http://www.securitytracker.com/id?1023520
Squid Processing of Header-Only DNS Messages Lets Remote Users Deny Service - SecurityTracker
-
http://www.squid-cache.org/Versions/v3/3.1/changesets/squid-3.1-9853.patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/56001
Squid DNS packet denial of service CVE-2010-0308 Vulnerability Report
-
http://www.securityfocus.com/bid/37522
Squid Header-Only Packets Remote Denial of Service Vulnerability
-
http://www.squid-cache.org/Advisories/SQUID-2010_1.txt
Vendor Advisory
-
http://www.vupen.com/english/advisories/2010/0260
Webmail | OVH- OVHVendor Advisory
-
http://www.squid-cache.org/Versions/v2/HEAD/changesets/12597.patch
-
http://www.squid-cache.org/Versions/v3/3.0/changesets/squid-3.0-9163.patch
Patch
Jump to