|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2014:0569-1)|
|Summary:||The remote host is missing an update for the 'squid3' package(s) announced via the SUSE-SU-2014:0569-1 advisory.|
The remote host is missing an update for the 'squid3' package(s) announced via the SUSE-SU-2014:0569-1 advisory.
A remote DoS attack in the Squid web proxy has been fixed.
Due to incorrect state management, Squid was vulnerable to a denial of service attack when processing certain HTTPS requests (CVE-2014-0128).
For more information see [link moved to references] .
Additionally, a bug in the logrotate configuration file has been fixed. The 'su' statement was moved into the
'logfile' section (bnc#677335).
Security Issue reference:
>Special Instructions and Notes:
Please reboot the system after installing this update.
'squid3' package(s) on SUSE Linux Enterprise Server 11 SP3
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2014-0128|
BugTraq ID: 66112
SuSE Security Announcement: SUSE-SU-2016:1996 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:2089 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0513 (Google Search)
SuSE Security Announcement: openSUSE-SU-2014:0559 (Google Search)
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.