|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Misc. >> Squid Multiple Flaws Vulnerability Assessment Details
|
Squid Multiple Flaws |
||
Acertains squid version Detailed Explanation for this Vulnerability Assessment The remote squid caching proxy, according to its version number, is vulnerable to various security flaws : - There is a buffer overflow issue when handling the reply of a rogue gopher site. To exploit this issue, a possible hacker would need to use the remote proxy to visit a specially setup gopher site generating malformed replies - There is a denial of service vulnerability in the WCCP code of the remote proxy. To exploit this flaw, a possible hacker would need to guess the IP of the WCCP router used by the proxy and spoof a malformed UDP packet using the router IP address. - There is a buffer overflow in the WCCP code which may permit a possible hacker to execute arbitrary code on the remote host - There is a flaw in the 'squid_ldap_auth' module which may permit a possible hacker to bypass authentication and to gain access to the remote proxy - There is a flaw in the way Squid parses HTTP reply headers *** Given the way the Squid team handles releases, this may be a *** false positive. Make sure that all the appropriate patches *** have been applied. Solution : Upgrade to squid 2.5.STABLE8 (when available) or newer See also : http://www.squid-cache.org/Versions/v2/2.5/bugs/ Network Security Threat Level: High Networks Security ID: 12275, 12276, 12412, 12433, 12432, 12431, 13434, 13435 Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2007 Tenable Network Security |
||
Cables, Connectors |
$599.99
$80.00
EXAGRID EX32000E Server Intel Xeon E5620 @ 2.40GHz 16GB RAM 16x 2TB HDD
$679.00
Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x900Gb SAS, Proxmox
$340.00
Intel Xeon E5-2680 v4 SR1N7 2.4GHz 14-Core 3.5MB 35MB Socket 2011-3 Server CPU
$11.99
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon E5-2697A V4 2.6GHz CPU Processor 16-Core Socket LGA2011 SR2K1
$39.99
Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3
$17.99
HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA
$234.98
Rare WaterCooled HP Z800 Workstation Dual Xeon X5680 16GB RAM 120GB SSD Nvidia
$279.56
|
||
No Discussions have been posted on this vulnerability. |