Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the squid package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory SUSE-SA:2005:006 (squid).
Squid is a feature-rich web-proxy with support for various web-related
The last two squid updates from February the 1st and 10th fix several
vulnerabilities. The impact of them range from remote denial-of-service
over cache poisoning to possible remote command execution.
Due to the hugh amount of bugs the vulnerabilities are just summarized
A buffer overflow in the Gopher responses parser leads
to memory corruption and usually crash squid.
An integer overflow in the receiver of WCCP (Web Cache
Communication Protocol) messages can be exploited remotely
by sending a specially crafted UDP datagram to crash squid.
A memory leak in the NTLM fakeauth_auth helper for
Squid 2.5.STABLE7 and earlier permits remote attackers
to cause a denial-of-service due to uncontrolled memory
The NTLM component in Squid 2.5.STABLE7 and earlier permits
remote attackers to cause a crash od squid by sending a
malformed NTLM message.
LDAP handles search filters very laxly. This behaviour can
be abused to log in using several variants of a login name,
possibly bypassing explicit access controls or confusing
CVE-2005-0175 and CVE-2005-0174
Minor problems in the HTTP header parsing code that
can be used for cache poisoning.
A buffer overflow in the WCCP handling code in Squid 2.5
before 2.5.STABLE7 permits remote attackers to cause a
denial-of-service and possibly execute arbitrary code
by using a long WCCP packet.
The httpProcessReplyHeader function in Squid 2.5-STABLE7
and earlier does not properly set the debug context when
it is handling 'oversized' HTTP reply headers. The impact
Solution : http://www.suse.de/security/advisories/2005_06_squid.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|DELL OPTIPLEX 3020 16GB RAM I7-4770 3.4GHZ 1TB HDD DVD RW UBUNTU OP SYS
|i5-7th Gen 16GB RAM 1TB HDD 500GB SSD GTX 1060 6gb Built In WiFi And Bluetooth
|Intel Core i9 9900X 3.5G 32Gb RAM 2TB 1TB SSD PNY P4000 Custom Workstation PC
|DELL XPS 15 9570 15.6 Laptop i7-8750H 32GB RAM 1TB SSD Nvidia GTX 1050Ti
No Discussions have been posted on this vulnerability.