Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in squid
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in squid
ID: RHSA-2005:061-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux
Datum: Sa, 12. Februar 2005, 12:00
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0241
http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
http://www.squid-cache.org/Advisories/SQUID-2005_2.txt
http://www.squid-cache.org/Advisories/SQUID-2005_3.txt
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_auth
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
Applikationen: Squid

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Squid package fixes security issues
Advisory ID: RHSA-2005:061-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-061.html
Issue date: 2005-02-11
Updated on: 2005-02-11
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0094 CAN-2005-0095 CAN-2005-0096 CAN-2005-0097
CAN-2005-0173 CAN-2005-0174 CAN-2005-0175 CAN-2005-0211 CAN-2005-0241
---------------------------------------------------------------------

1. Summary:

An updated Squid package that fixes several security issues is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Squid is a full-featured Web proxy cache.

A buffer overflow flaw was found in the Gopher relay parser. This bug
could allow a remote Gopher server to crash the Squid proxy that reads data
from it. Although Gopher servers are now quite rare, a malicious web page
(for example) could redirect or contain a frame pointing to an attacker's
malicious gopher server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0094 to this issue.

An integer overflow flaw was found in the WCCP message parser. It is
possible to crash the Squid server if an attacker is able to send a
malformed WCCP message with a spoofed source address matching Squid's
"home router". The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0095 to this issue.

A memory leak was found in the NTLM fakeauth_auth helper. It is possible
that an attacker could place the Squid server under high load, causing the
NTML fakeauth_auth helper to consume a large amount of memory, resulting in
a denial of service. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0096 to this issue.

A NULL pointer de-reference bug was found in the NTLM fakeauth_auth helper.
It is possible for an attacker to send a malformed NTLM type 3 message,
causing the Squid server to crash. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0097 to
this issue.

A username validation bug was found in squid_ldap_auth. It is possible for
a username to be padded with spaces, which could allow a user to bypass
explicit access control rules or confuse accounting. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0173 to this issue.

The way Squid handles HTTP responses was found to need strengthening. It is
possible that a malicious web server could send a series of HTTP responses
in such a way that the Squid cache could be poisoned, presenting users with
incorrect webpages. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2005-0174 and CAN-2005-0175 to
these issues.

A bug was found in the way Squid handled oversized HTTP response headers.
It is possible that a malicious web server could send a specially crafted
HTTP header which could cause the Squid cache to be poisoned, presenting
users with incorrect webpages. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-0241 to this issue.

A buffer overflow bug was found in the WCCP message parser. It is possible
that an attacker could send a malformed WCCP message which could crash the
Squid server or execute arbitrary code. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0211
to this issue.

Users of Squid should upgrade to this updated package, which contains
backported patches, and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145540 - CAN-2005-0094 Multiple issues with squid (CAN-2005-0095 CAN-2005-0096
CAN-2005-0097)
146159 - CAN-2005-0173 Multiple squid issues (CAN-2005-0174 CAN-2005-0175)
146780 - CAN-2005-0241 Correct handling of oversized reply headers

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm

ia64:
223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

ia64:
223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

ppc:
eeabefd918d66aed11cfc1b28403b141 squid-2.5.STABLE3-6.3E.7.ppc.rpm

s390:
7a2b9540c7b55ee44984f796e39d806d squid-2.5.STABLE3-6.3E.7.s390.rpm

s390x:
372366d5fbaa404527a43e9de8f46cdd squid-2.5.STABLE3-6.3E.7.s390x.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
http://www.squid-cache.org/Advisories/SQUID-2005_2.txt
http://www.squid-cache.org/Advisories/SQUID-2005_3.txt
#squid-2.5.STABLE7-fakeauth_auth
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0241

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCDLgwXlSAg2UNWIIRAijmAJ9RPVzVaX2fDMS9Qs032YUMt3BHTQCgl9Mb
HTTQgPJBJ8xIXwFBTezCvZ0=
=OsgH
-----END PGP SIGNATURE-----


--
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung