Executive Summary
Summary | |
---|---|
Title | New squid packages fix IP spoofing vulnerability |
Informations | |||
---|---|---|---|
Name | DSA-751 | First vendor Publication | 2005-07-11 |
Vendor | Debian | Last vendor Modification | 2005-07-11 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The upstream developers have discovered a bug in the DNS lookup code of Squid, the popular WWW proxy cache. When the DNS client UDP port (assigned by the operating system at startup) is unfiltered and the network is not protected from IP spoofing, malicious users can spoof DNS lookups which could result in users being redirected to arbitrary web sites. For the old stable distribution (woody) this problem has been fixed in version 2.4.6-2woody9. For the stable distribution (sarge) this problem has already been fixed in version squid-2.5.9-9. For the unstable distribution (sid) this problem has already been fixed in version squid-2.5.9-9. We recommend that you upgrade your squid package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-751 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:9976 | |||
Oval ID: | oval:org.mitre.oval:def:9976 | ||
Title: | Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups. | ||
Description: | Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-1519 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for squid File : nvt/sles9p5015546.nasl |
2008-09-04 | Name : FreeBSD Ports: squid File : nvt/freebsd_squid14.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 751-1 (squid) File : nvt/deb_751_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 809-2 (squid) File : nvt/deb_809_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 809-3 (squid) File : nvt/deb_809_3.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
16335 | Squid DNS Lookup Spoofing Squid Proxy contains a flaw that may allow a malicious user to spoof DNS lookups. The issue is triggered when an unspecified error occur in the DNS client while handling DNS responses. It is possible that the flaw may allow a malicious user to spoof DNS lookups resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Squid proxy DNS response spoofing attempt RuleID : 17495 - Revision : 9 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2005-415.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-129-1.nasl - Type : ACT_GATHER_INFO |
2005-09-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-809.nasl - Type : ACT_GATHER_INFO |
2005-07-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_7e97b288c7ca11d99e1ec296ac722cb3.nasl - Type : ACT_GATHER_INFO |
2005-07-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-751.nasl - Type : ACT_GATHER_INFO |
2005-06-25 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2005-104.nasl - Type : ACT_GATHER_INFO |
2005-06-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-415.nasl - Type : ACT_GATHER_INFO |
2005-06-13 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-489.nasl - Type : ACT_GATHER_INFO |
2005-05-19 | Name : The remote Fedora Core host is missing a security update. File : fedora_2005-373.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:08 |
|