|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:006: squid Vulnerability Assessment Details
|
SUSE-SA:2005:006: squid |
||
Check for the version of the squid package Detailed Explanation for this Vulnerability Assessment The remote host is missing the patch for the advisory SUSE-SA:2005:006 (squid). Squid is a feature-rich web-proxy with support for various web-related protocols. The last two squid updates from February the 1st and 10th fix several vulnerabilities. The impact of them range from remote denial-of-service over cache poisoning to possible remote command execution. Due to the hugh amount of bugs the vulnerabilities are just summarized here. CVE-2005-0094 A buffer overflow in the Gopher responses parser leads to memory corruption and usually crash squid. CVE-2005-0095 An integer overflow in the receiver of WCCP (Web Cache Communication Protocol) messages can be exploited remotely by sending a specially crafted UDP datagram to crash squid. CVE-2005-0096 A memory leak in the NTLM fakeauth_auth helper for Squid 2.5.STABLE7 and earlier permits remote attackers to cause a denial-of-service due to uncontrolled memory consumption. CVE-2005-0097 The NTLM component in Squid 2.5.STABLE7 and earlier permits remote attackers to cause a crash od squid by sending a malformed NTLM message. CVE-2005-0173 LDAP handles search filters very laxly. This behaviour can be abused to log in using several variants of a login name, possibly bypassing explicit access controls or confusing accounting. CVE-2005-0175 and CVE-2005-0174 Minor problems in the HTTP header parsing code that can be used for cache poisoning. CVE-2005-0211 A buffer overflow in the WCCP handling code in Squid 2.5 before 2.5.STABLE7 permits remote attackers to cause a denial-of-service and possibly execute arbitrary code by using a long WCCP packet. CVE-2005-0241 The httpProcessReplyHeader function in Squid 2.5-STABLE7 and earlier does not properly set the debug context when it is handling 'oversized' HTTP reply headers. The impact is unknown. Solution : http://www.suse.de/security/advisories/2005_06_squid.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security |
||
Cables, Connectors |
Fortinet Fortigate FG-61E Firewall Network Security Appliance ATP Bundle 1 years
$269.99
Cisco ASA 5506-X V07 8-Port Network Security Firewall Appliance + AC Adapter
$67.77
Fortinet Fortiwifi 60D FG-60D Security Appliance Firewall / VPN w/ AC Adapter
$34.97
Palo Alto PA-220 Next-Gen Firewall 520-000309-00J w/ Power adapter
$69.98
pfSense/OPNsense FireFX Firewall - Intel J1900 Quad Core - 64 GB SSD - 4 GB RAM
$117.00
Fortinet FortiGate 90E Network Security Firewall FG-90E
$26.99
Cisco ASA 5506-X Network Security Firewall Appliance
$27.38
Cisco ASA 5505 Fast Ethernet Firewall Security Appliance
$12.99
Cisco ASA 5508-X ASA5508-K9 w/ FirePOWER Services 8GE AC 3DES/AES Next Gen Fire
$70.00
Pulse Secure PSA3000 Security Firewall Appliance SSL VPN
$64.99
|
||
No Discussions have been posted on this vulnerability. |