Login
Newsletter
Werbung

Sicherheit: Denial of Service in Squid
Aktuelle Meldungen Distributionen
Name: Denial of Service in Squid
ID: USN-724-1
Distribution: Ubuntu
Plattformen: Ubuntu 8.10
Datum: Do, 26. Februar 2009, 13:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0478
Applikationen: Squid

Originalnachricht


--===============1255106975916943733==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="OaZoDhBhXzo6bW1J"
Content-Disposition: inline


--OaZoDhBhXzo6bW1J
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

===========================================================
Ubuntu Security Notice USN-724-1 February 25, 2009
squid vulnerability
CVE-2009-0478
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
squid 2.7.STABLE3-1ubuntu2.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered that Squid did
not properly validate the HTTP version when processing requests. A remote
attacker could exploit this to cause a denial of service (assertion failure).


Updated packages for Ubuntu 8.10:

Source archives:

squid_2.7.STABLE3-1ubuntu2.1.diff.gz
Size/MD5: 303042 9132293f589a71ae3f771e1ae6de30f1
squid_2.7.STABLE3-1ubuntu2.1.dsc
Size/MD5: 1252 6953f88d6f4825daabd9e77bd0fa1a88
squid_2.7.STABLE3.orig.tar.gz
Size/MD5: 1782040 a4d7608696e2b617aa5853c7d23e25b0

Architecture independent packages:

squid-common_2.7.STABLE3-1ubuntu2.1_all.deb
Size/MD5: 495876 b6d1e76b140c792297c14382a06ed3e3

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

squid_2.7.STABLE3-1ubuntu2.1_amd64.deb
Size/MD5: 771610 7f2ca95b0497cc23f0bf26b7a6503cc7
squid-cgi_2.7.STABLE3-1ubuntu2.1_amd64.deb
Size/MD5: 119880 27ff06a902debe143acb7b3959fb1c52

i386 architecture (x86 compatible Intel/AMD):

squid_2.7.STABLE3-1ubuntu2.1_i386.deb
Size/MD5: 695708 312c710ebdb46e3017b02cb672d14524
squid-cgi_2.7.STABLE3-1ubuntu2.1_i386.deb
Size/MD5: 118638 f2f2f698523d49d8971c7a22faebc427

lpia architecture (Low Power Intel Architecture):

squid_2.7.STABLE3-1ubuntu2.1_lpia.deb
Size/MD5: 694080 6720b3aca93aabb7600a1a2c2f699af5
squid-cgi_2.7.STABLE3-1ubuntu2.1_lpia.deb
Size/MD5: 118550 7484981bd7c4c8b6361362e98d5d1631

powerpc architecture (Apple Macintosh G3/G4/G5):

squid_2.7.STABLE3-1ubuntu2.1_powerpc.deb
Size/MD5: 777958 b9d530e92ad4638fb8d169ef55eb33f4
squid-cgi_2.7.STABLE3-1ubuntu2.1_powerpc.deb
Size/MD5: 120446 9899cd403bbca3e0e6f5a936cd2d9955

sparc architecture (Sun SPARC/UltraSPARC):

squid_2.7.STABLE3-1ubuntu2.1_sparc.deb
Size/MD5: 719088 2781d6fd1c7adc0b76aa12670ac1abb5
squid-cgi_2.7.STABLE3-1ubuntu2.1_sparc.deb
Size/MD5: 119398 8a26b4da728c31d7bd116666191575b2



--OaZoDhBhXzo6bW1J
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkmmiwcACgkQW0JvuRdL8BoVtACfdehVMjrB0RbMoqIOFr70r2Ty
B1kAn3u+JZiHKeP/aqu/B60R7AN9OGSN
=rA4P
-----END PGP SIGNATURE-----

--OaZoDhBhXzo6bW1J--


--===============1255106975916943733==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1255106975916943733==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung