Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2005-275: squid


Vulnerability Assessment Details

Fedora Core 2 2005-275: squid

Vulnerability Assessment Summary
Check for the version of the squid package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-275 (squid).

Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects. Unlike traditional
caching software, Squid handles all requests in a single,
non-blocking, I/O-driven process. Squid keeps meta data and especially
hot objects cached in RAM, caches DNS lookups, supports non-blocking
DNS lookups, and implements negative caching of failed requests.

Squid consists of a main server program squid, a Domain Name System
lookup program (dnsserver), a program for retrieving FTP data
(ftpget), and some management and client tools.

Note that squid-2.5.STABLE7 and later do not use /etc/squid/errors for
error messages. If you do not want to use the default English error
messages, you must set the error_directory in your
/etc/squid/squid.conf to the appropriate subdirectory of
/usr/share/squid/errors


* Tue Mar 29 2005 Jay Fenlason 7:2.5.STABLE9-1.FC3.2

- more upstream patches
- include -libbind patch, to prevent squid from picking up a
dependency
on libbind.
- remove references to /etc/squid/errors, since squid now uses
{_datadir}/squid/errors/English by default. (overridable in
squid.conf)
- Mark {datadir}/squid/errors as config(noreplace) so custom error
messages
won't get scribbled on.

* Wed Mar 16 2005 Jay Fenlason 7:2.5.STABLE9-1.FC3.1

- New upstream version, with 14 upstream patches. Includes fix for
bz#150234 cookie leak in squid



Solution : http://www.fedoranews.org/blog/index.php?p=546
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


Vintage Atari 800XL Computer *UNTESTED* No Power Cords Or Cables picture

Vintage Atari 800XL Computer *UNTESTED* No Power Cords Or Cables

$50.00



Vintage Atari 1040STf Computer with Mouse and Box, Minimal Testing, Pls Read  picture

Vintage Atari 1040STf Computer with Mouse and Box, Minimal Testing, Pls Read

$149.99



Atari Power Cube 800XL, 600XL, 65XE, 130XE  USB-C Power Supply PSU picture

Atari Power Cube 800XL, 600XL, 65XE, 130XE USB-C Power Supply PSU

$11.25



Vintage Suncom Slik Stik Joystick - Atari 2600 & Commodore 64 - Tested & Working picture

Vintage Suncom Slik Stik Joystick - Atari 2600 & Commodore 64 - Tested & Working

$23.00



A8picoCart Atari 130 / 65 XE 800 / 1200 XL XEGS multicart UnoCart clone game picture

A8picoCart Atari 130 / 65 XE 800 / 1200 XL XEGS multicart UnoCart clone game

$32.95



Atari 400/800/XL/XE Computer SIO2PC - PC/Mac Disk Drive Emulator Adapter/Device picture

Atari 400/800/XL/XE Computer SIO2PC - PC/Mac Disk Drive Emulator Adapter/Device

$15.25



Atari 410 Program Cassette Recorder Clean Tested picture

Atari 410 Program Cassette Recorder Clean Tested

$50.00



Rare Vintage Collectible Original Atari 800 Home Computer With Case - UNTESTED picture

Rare Vintage Collectible Original Atari 800 Home Computer With Case - UNTESTED

$219.99



ATARI Home Computers HOME FILING MANAGER Software  **SEALED NEW** 1982 picture

ATARI Home Computers HOME FILING MANAGER Software **SEALED NEW** 1982

$25.00



TEAM TAP Atari Jaguar Multi Player Adapter NEW In Box picture

TEAM TAP Atari Jaguar Multi Player Adapter NEW In Box

$25.46



Discussions

No Discussions have been posted on this vulnerability.