Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Acertains squid version
Detailed Explanation for this Vulnerability Assessment
The remote squid caching proxy, according to its version number,
is vulnerable to various security flaws :
- There is a buffer overflow issue when handling the reply of
a rogue gopher site. To exploit this issue, a possible hacker would
need to use the remote proxy to visit a specially setup gopher
site generating malformed replies
- There is a denial of service vulnerability in the WCCP code
of the remote proxy. To exploit this flaw, a possible hacker would need
to guess the IP of the WCCP router used by the proxy and spoof a
malformed UDP packet using the router IP address.
- There is a buffer overflow in the WCCP code which may permit a possible hacker
to execute arbitrary code on the remote host
- There is a flaw in the 'squid_ldap_auth' module which may permit
a possible hacker to bypass authentication and to gain access to the
- There is a flaw in the way Squid parses HTTP reply headers
*** Given the way the Squid team handles releases, this may be a
*** false positive. Make sure that all the appropriate patches
*** have been applied.
Solution : Upgrade to squid 2.5.STABLE8 (when available) or newer
See also : http://www.squid-cache.org/Versions/v2/2.5/bugs/
Network Security Threat Level: High
Networks Security ID: 12275, 12276, 12412, 12433, 12432, 12431, 13434, 13435
Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security
|Knoppix 9.1.0 (i486) DVD
|Knoppix V3.2 Linux CD Bootable Operating System Data Rcovery Tool
|Knoppix Linux 9.1 LIVE 32GB bootable USB 3.1/3.0/2.0 w/ PERSISTENCE
|Knoppix Linux Bootable OS v8.6 "Original Live Operating System" 32G USB Stick
No Discussions have been posted on this vulnerability.