Joined: 17 Apr 2002
Location: Raleigh, NC
|Posted: Wed Feb 02, 2005 8:40 pm Post subject: [ GLSA 200502-04 ] Squid: Multiple vulnerabilities
|Gentoo Linux Security Advisory
Title: Squid: Multiple vulnerabilities (GLSA 200502-04)
Date: February 02, 2005
Bug(s): #79495, #78776, #80201, #80341
Squid contains vulnerabilities in the code handling WCCP, HTTP and LDAP
which could lead to Denial of Service, access control bypass, web cache and
Squid is a full-featured Web proxy cache designed to run on Unix
systems. It supports proxying and caching of HTTP, FTP, and other
protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many other features.
Vulnerable: < 2.5.7-r5
Unaffected: >= 2.5.7-r5
Architectures: All supported architectures
Squid contains several vulnerabilities:
- Buffer overflow when handling WCCP recvfrom()
- Loose checking of HTTP headers (CAN-2005-0173 and
- Incorrect handling of LDAP login names with spaces
An attacker could exploit:
- the WCCP buffer overflow to cause Denial of Service.
- the HTTP header parsing vulnerabilities to inject arbitrary
response data, potentially leading to content spoofing, web cache
poisoning and other cross-site scripting or HTTP response splitting
- the LDAP issue to login with several variations of the same login
name, leading to log poisoning.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r5"
Last edited by GLSA on Tue Nov 26, 2013 4:19 am; edited 5 times in total