Vulnerability Details : CVE-2011-4096
The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record.
Vulnerability category: Denial of service
Products affected by CVE-2011-4096
- cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable4:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable5:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable1:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable10:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable6:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable7:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable8:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre5:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre4:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable2:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable3:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre2:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre3:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable14:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable15:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre7:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre6:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable11:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable12:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable9:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:pre1:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:stable13:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:rc1:stable11:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable22:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable15:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable14:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable21:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable20:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable13:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable12:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable19:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable18:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable11:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable9:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable17:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable16:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable8:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable23:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable11:rc1:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable10:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable16:rc1:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable24:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.0.stable25:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:squid-cache:squid:3.1.9:*:*:*:*:*:*:*
Threat overview for CVE-2011-4096
Top countries where our scanners detected CVE-2011-4096
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-4096 60,162
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-4096!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-4096
93.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4096
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-4096
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4096
-
http://www.redhat.com/support/errata/RHSA-2011-1791.html
Support
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:193
mandriva.com
-
http://www.securitytracker.com/id?1026265
Squid Resource Record Memory Free Error Lets Remote Users Deny Service - SecurityTracker
-
http://www.openwall.com/lists/oss-security/2011/10/31/5
oss-security - CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
-
http://www.openwall.com/lists/oss-security/2011/11/01/3
oss-security - Re: CVE Request -- Squid v3.1.16 -- Invalid free by processing CNAME DNS record pointing to another CNAME record pointing to an empty A-record
-
http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID_3_1_16.html
Squid 3.1.16 changes
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00040.html
[security-announce] SUSE-SU-2016:2089-1: important: Security update for
-
http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12
Bug 3237 – seq fault in free() from rfc1035RRDestroy at rfc1035.c:488
-
http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html
[security-announce] SUSE-SU-2016:1996-1: important: Security update for
Jump to