Joined: 17 Apr 2002
Location: Baltimore, MD
|Posted: Fri Feb 18, 2005 4:09 pm Post subject: [ GLSA 200502-25 ] Squid: Denial of Service through DNS resp
|Gentoo Linux Security Advisory
Title: Squid: Denial of Service through DNS responses (GLSA 200502-25)
Date: February 18, 2005
Squid contains a bug in the handling of certain DNS responses resulting in
a Denial of Service.
Squid is a full-featured Web proxy cache designed to run on
Unix-like systems. It supports proxying and caching of HTTP, FTP, and
other protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many other features.
Vulnerable: < 2.5.8
Unaffected: >= 2.5.8
Architectures: All supported architectures
Handling of certain DNS responses trigger assertion failures.
By returning a specially crafted DNS response an attacker could
cause Squid to crash by triggering an assertion failure.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.8"
Last edited by GLSA on Tue May 20, 2014 4:19 am; edited 7 times in total