Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Misc. >> Squid Multiple Flaws


Vulnerability Assessment Details

Squid Multiple Flaws

Vulnerability Assessment Summary
Acertains squid version

Detailed Explanation for this Vulnerability Assessment

The remote squid caching proxy, according to its version number,
is vulnerable to various security flaws :

- There is a buffer overflow issue when handling the reply of
a rogue gopher site. To exploit this issue, a possible hacker would
need to use the remote proxy to visit a specially setup gopher
site generating malformed replies


- There is a denial of service vulnerability in the WCCP code
of the remote proxy. To exploit this flaw, a possible hacker would need
to guess the IP of the WCCP router used by the proxy and spoof a
malformed UDP packet using the router IP address.

- There is a buffer overflow in the WCCP code which may permit a possible hacker
to execute arbitrary code on the remote host

- There is a flaw in the 'squid_ldap_auth' module which may permit
a possible hacker to bypass authentication and to gain access to the
remote proxy

- There is a flaw in the way Squid parses HTTP reply headers


*** Given the way the Squid team handles releases, this may be a
*** false positive. Make sure that all the appropriate patches
*** have been applied.

Solution : Upgrade to squid 2.5.STABLE8 (when available) or newer
See also : http://www.squid-cache.org/Versions/v2/2.5/bugs/
Network Security Threat Level: High

Networks Security ID: 12275, 12276, 12412, 12433, 12432, 12431, 13434, 13435

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security

Cables, Connectors

INTEL XEON CPU KIT E5-2670 8 CORE 8C 2.6GHZ FOR HP PROLIANT DL360P G8 654786-L21
$164.0
INTEL XEON CPU KIT E5-2670 8 CORE 8C 2.6GHZ FOR HP PROLIANT DL360P G8 654786-L21 pictureINTEL XEON CPU KIT E5-2665 8 CORE 8C 2.40GHZ FOR DELL POWEREDGE C8220 E5-2665
$790.0
INTEL XEON CPU KIT E5-2665 8 CORE 8C 2.40GHZ FOR DELL POWEREDGE C8220 E5-2665 pictureLENOVO CPU KIT INTEL XEON 8 CORE PROCESSOR E 4XG0G89087
$525.0
LENOVO CPU KIT INTEL XEON 8 CORE PROCESSOR E 4XG0G89087 pictureIBM CPU KIT INTEL XEON 8 CORE PROCESSOR X7550 2 49Y9939
$699.0
IBM CPU KIT INTEL XEON 8 CORE PROCESSOR X7550 2 49Y9939 picture


Discussions

No Discussions have been posted on this vulnerability.