Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Ubuntu Local Security Checks >> USN77-1 : squid vulnerabilities


Vulnerability Assessment Details

USN77-1 : squid vulnerabilities

Vulnerability Assessment Summary
squid vulnerabilities

Detailed Explanation for this Vulnerability Assessment

Summary :

These remote packages are missing security patches :
- squid
- squid-cgi
- squid-common
- squidclient


Description :

A possible authentication bypass was discovered in the LDAP
authentication backend. LDAP ignores leading and trailing whitespace
in search filters. This could possibly be abused to bypass explicit
access controls or confuse accounting when using several variants of
the login name. (CVE-2005-0173)

Previous Squid versions were not strict enough while parsing HTTP
requests and responses. Various violations of the HTTP protocol, such
as multiple Content-Length header lines, invalid "Carriage Return"
characters, and HTTP header names containing whitespace, led to cache
pollution and could possibly be exploited to deliver wrong content to
clients. (CVE-2005-0174)

Squid was susceptible to a cache poisoning attack called "HTTP
response splitting", where false replies are injected in the HTTP
stream. This permited malicious web servers to forge wrong cache
content for arbitrary web sites, which was then delivered to Squid
clients. (CVE-2005-0175)

The FSC Vulnerability Research Team discovered a buffer overflow in
t
[...]

Solution :

Upgrade to :
- squid-2.5.5-6ubuntu0.4 (Ubuntu 4.10)
- squid-cgi-2.5.5-6ubuntu0.4 (Ubuntu 4.10)
- squid-common-2.5.5-6ubuntu0.4 (Ubuntu 4.10)
- squidclient-2.5.5-6ubuntu0.4 (Ubuntu 4.10)



Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi

Cables, Connectors

DELL 50XV4 1TB 7.2K 3.5" ENTERPRISE CLASS SATA SERVER HDD & CADDY WD1002FBYS
$141.35
DELL 50XV4 1TB 7.2K 3.5Dell PowerEdge R720 2x E5-2630 v2 2.6Ghz 6 Core 384GB 8x 300GB 15K SAS H710
$4619.0
Dell PowerEdge R720 2x E5-2630 v2 2.6Ghz 6 Core 384GB 8x 300GB 15K SAS H710 pictureDell PowerEdge R710 2x X5670 2.93GHz 6 Core 64GB 6x 3TB 7.2K SAS PERC H700
$1430.0
Dell PowerEdge R710 2x X5670 2.93GHz 6 Core 64GB 6x 3TB 7.2K SAS PERC H700 pictureDell PowerEdge R710 2x X5550 2.66GHz Quad Core 16GB 8x 128GB SATA SSD PERC 6/i
$855.0
Dell PowerEdge R710 2x X5550 2.66GHz Quad Core 16GB 8x 128GB SATA SSD PERC 6/i picture


Discussions

No Discussions have been posted on this vulnerability.