Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the squid package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory SUSE-SA:2005:006 (squid).
Squid is a feature-rich web-proxy with support for various web-related
The last two squid updates from February the 1st and 10th fix several
vulnerabilities. The impact of them range from remote denial-of-service
over cache poisoning to possible remote command execution.
Due to the hugh amount of bugs the vulnerabilities are just summarized
A buffer overflow in the Gopher responses parser leads
to memory corruption and usually crash squid.
An integer overflow in the receiver of WCCP (Web Cache
Communication Protocol) messages can be exploited remotely
by sending a specially crafted UDP datagram to crash squid.
A memory leak in the NTLM fakeauth_auth helper for
Squid 2.5.STABLE7 and earlier permits remote attackers
to cause a denial-of-service due to uncontrolled memory
The NTLM component in Squid 2.5.STABLE7 and earlier permits
remote attackers to cause a crash od squid by sending a
malformed NTLM message.
LDAP handles search filters very laxly. This behaviour can
be abused to log in using several variants of a login name,
possibly bypassing explicit access controls or confusing
CVE-2005-0175 and CVE-2005-0174
Minor problems in the HTTP header parsing code that
can be used for cache poisoning.
A buffer overflow in the WCCP handling code in Squid 2.5
before 2.5.STABLE7 permits remote attackers to cause a
denial-of-service and possibly execute arbitrary code
by using a long WCCP packet.
The httpProcessReplyHeader function in Squid 2.5-STABLE7
and earlier does not properly set the debug context when
it is handling 'oversized' HTTP reply headers. The impact
Solution : http://www.suse.de/security/advisories/2005_06_squid.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|Cisco CP-7975G Unified VOIP Color Touch Screen Display
|Cisco AS535-2T1-48-AC-V Universal Gateway AS5350 2T1 NP60 48 Data/Voice VOIP
|Cisco AS535XM-8T1-V-HC VOIP Gateway 8CT1, 2 AS5X-FC 8 x AS5X-PVDM2-64 AS5350XM
|Cisco CP-7962G 7962 6 Line IP VoIP PoE Office Phone w/ Handset
No Discussions have been posted on this vulnerability.