-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
--------------------------------------------------------------------- Red Hat Security Advisory
Synopsis: Updated Squid package fixes security issues Advisory ID: RHSA-2005:061-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-061.html Issue date: 2005-02-11 Updated on: 2005-02-11 Product: Red Hat Enterprise Linux CVE Names: CAN-2005-0094 CAN-2005-0095 CAN-2005-0096 CAN-2005-0097 CAN-2005-0173 CAN-2005-0174 CAN-2005-0175 CAN-2005-0211 CAN-2005-0241 ---------------------------------------------------------------------
1. Summary:
An updated Squid package that fixes several security issues is now available.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
Squid is a full-featured Web proxy cache.
A buffer overflow flaw was found in the Gopher relay parser. This bug could allow a remote Gopher server to crash the Squid proxy that reads data from it. Although Gopher servers are now quite rare, a malicious web page (for example) could redirect or contain a frame pointing to an attacker's malicious gopher server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0094 to this issue.
An integer overflow flaw was found in the WCCP message parser. It is possible to crash the Squid server if an attacker is able to send a malformed WCCP message with a spoofed source address matching Squid's "home router". The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0095 to this issue.
A memory leak was found in the NTLM fakeauth_auth helper. It is possible that an attacker could place the Squid server under high load, causing the NTML fakeauth_auth helper to consume a large amount of memory, resulting in a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0096 to this issue.
A NULL pointer de-reference bug was found in the NTLM fakeauth_auth helper. It is possible for an attacker to send a malformed NTLM type 3 message, causing the Squid server to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0097 to this issue.
A username validation bug was found in squid_ldap_auth. It is possible for a username to be padded with spaces, which could allow a user to bypass explicit access control rules or confuse accounting. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0173 to this issue.
The way Squid handles HTTP responses was found to need strengthening. It is possible that a malicious web server could send a series of HTTP responses in such a way that the Squid cache could be poisoned, presenting users with incorrect webpages. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0174 and CAN-2005-0175 to these issues.
A bug was found in the way Squid handled oversized HTTP response headers. It is possible that a malicious web server could send a specially crafted HTTP header which could cause the Squid cache to be poisoned, presenting users with incorrect webpages. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0241 to this issue.
A buffer overflow bug was found in the WCCP message parser. It is possible that an attacker could send a malformed WCCP message which could crash the Squid server or execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0211 to this issue.
Users of Squid should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/):
145540 - CAN-2005-0094 Multiple issues with squid (CAN-2005-0095 CAN-2005-0096 CAN-2005-0097) 146159 - CAN-2005-0173 Multiple squid issues (CAN-2005-0174 CAN-2005-0175) 146780 - CAN-2005-0241 Correct handling of oversized reply headers
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS: squid-2.4.STABLE7-1.21as.4.src.rpm 95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm
i386: a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm
ia64: 223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS: squid-2.4.STABLE7-1.21as.4.src.rpm 95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm
ia64: 223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS: squid-2.4.STABLE7-1.21as.4.src.rpm 95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm
i386: a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS: squid-2.5.STABLE3-6.3E.7.src.rpm d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm
i386: 3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm
ia64: 44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm
ppc: eeabefd918d66aed11cfc1b28403b141 squid-2.5.STABLE3-6.3E.7.ppc.rpm
s390: 7a2b9540c7b55ee44984f796e39d806d squid-2.5.STABLE3-6.3E.7.s390.rpm
s390x: 372366d5fbaa404527a43e9de8f46cdd squid-2.5.STABLE3-6.3E.7.s390x.rpm
x86_64: cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm
Red Hat Desktop version 3:
SRPMS: squid-2.5.STABLE3-6.3E.7.src.rpm d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm
i386: 3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm
x86_64: cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS: squid-2.5.STABLE3-6.3E.7.src.rpm d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm
i386: 3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm
ia64: 44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm
x86_64: cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS: squid-2.5.STABLE3-6.3E.7.src.rpm d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm
i386: 3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm
ia64: 44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm
x86_64: cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package
7. References:
http://www.squid-cache.org/Advisories/SQUID-2005_1.txt http://www.squid-cache.org/Advisories/SQUID-2005_2.txt http://www.squid-cache.org/Advisories/SQUID-2005_3.txt #squid-2.5.STABLE7-fakeauth_auth http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0241
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/
Copyright 2005 Red Hat, Inc.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQFCDLgwXlSAg2UNWIIRAijmAJ9RPVzVaX2fDMS9Qs032YUMt3BHTQCgl9Mb HTTQgPJBJ8xIXwFBTezCvZ0= =OsgH -----END PGP SIGNATURE-----
-- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-list
|