Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-276: squid


Vulnerability Assessment Details

Fedora Core 3 2005-276: squid

Vulnerability Assessment Summary
Check for the version of the squid package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-276 (squid).

Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.

Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.

Note that squid-2.5.STABLE7 and later do not use /etc/squid/errors for
error messages. If you do not want to use the default English error
messages, you must set the error_directory in your
/etc/squid/squid.conf to the appropriate subdirectory of
/usr/share/squid/errors

* Wed Mar 23 2005 Jay Fenlason 7:2.5.STABLE9-1.FC3.4

- Add more upstream patches.
- add the -libbind patch, to avoid picking up a new dependency on libbind.
- Remove references to /etc/squid/errors from this spec, since squid
now uses {_datadir}/squid/errors/English/ by default (overridable in
/etc/squid/squid.conf, as always)
- mark {_datadir}/squid/errors as config(noreplace) so custom error messages
won't get stomped on.

* Wed Mar 16 2005 Jay Fenlason 7:2.5.STABLE9-1.FC3.3

- Actually apply the -date patch.

* Wed Mar 16 2005 Jay Fenlason 7:2.5.STABLE9-1.FC3.2

- New upstream version, with 14 patches. Includes fix for
bz#150234 cookie leak in squid




Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R630 10 BAY TWO E5-2623V4 2.6GHZ 768GB 2TB SAS 12G H330
$10469.0
DELL POWEREDGE R630 10 BAY TWO E5-2623V4 2.6GHZ 768GB 2TB SAS 12G H330 pictureDELL POWEREDGE R430 SERVER TWO E5-2630V3 2.4GHZ 32GB NO HDD H730P
$3269.0
DELL POWEREDGE R430 SERVER TWO E5-2630V3 2.4GHZ 32GB NO HDD H730P pictureDELL POWEREDGE R730XD SERVER 12 BAY E5-2697V4 2.3GHz 192GB 4 X 4TB SATA 900GB 10
$7429.0
DELL POWEREDGE R730XD SERVER 12 BAY E5-2697V4 2.3GHz 192GB 4 X 4TB SATA 900GB 10 pictureDELL POWEREDGE R720XD SERVER 3.5 TWO E5-2609 2.40GHZ 48GB 5 X 4TB SATA H710
$3249.0
DELL POWEREDGE R720XD SERVER 3.5 TWO E5-2609 2.40GHZ 48GB 5 X 4TB SATA H710 picture


Discussions

No Discussions have been posted on this vulnerability.