Package : squid Vulnerability : buffer overflow, integer overflow Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-0094 CAN-2005-0095
Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities:
CAN-2005-0094
"infamous41md" discovered a buffer overflow in the parser for Gopher responses which will lead to memory corruption and usually crash Squid.
CAN-2005-0095
"infamous41md" discovered an integer overflow in the receiver of WCCP (Web Cache Communication Protocol) messages. An attacker could send a specially crafted UDP datagram that will cause Squid to crash.
For the stable distribution (woody) these problems have been fixed in version 2.4.6-2woody5.
For the unstable distribution (sid) these problems have been fixed in version 2.5.7-4.
We recommend that you upgrade your squid package.
Upgrade Instructions --------------------
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody --------------------------------