Executive Summary
Summary | |
---|---|
Title | squid security update |
Informations | |||
---|---|---|---|
Name | RHSA-2006:0052 | First vendor Publication | 2006-03-07 |
Vendor | RedHat | Last vendor Modification | 2006-03-07 |
Severity (Vendor) | Moderate | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated squid package that fixes a security vulnerability as well as several issues is now available. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Problem description: Squid is a high-performance proxy caching server for Web clients, supporting FTP, gopher, and HTTP data objects. A denial of service flaw was found in the way squid processes certain NTLM authentication requests. It is possible for a remote attacker to crash the Squid server by sending a specially crafted NTLM authentication request. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2005-2917 to this issue. The following issues have also been fixed in this update: * An error introduced in squid-2.5.STABLE6-3.4E.12 can crash Squid when a * An error introduced in the old package prevented Squid from returning * Some authentication helpers needed SETUID rights but did not have them. * Squid could not handle a reply from an HTTP server when the reply began * An issue was discovered when a reply from an HTTP server was not * The updated package keeps user-defined error pages when the package 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 160704 - squid child processes exit with signal 6.. squid crashes 162660 - pam authentication fails 168378 - CVE-2005-2917 Squid malformed NTLM authentication DoS 170399 - Squid blocks page served by broken server 172375 - Error pages should not be replaced by updates 172392 - One translated Polish language error is missing preventing squid from startup 172697 - Squid doesn't handle headers split across packets |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2006-0052.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11580 | |||
Oval ID: | oval:org.mitre.oval:def:11580 | ||
Title: | Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart). | ||
Description: | Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart). | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2005-2917 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for squid File : nvt/sles9p5017904.nasl |
2008-09-04 | Name : FreeBSD Ports: squid File : nvt/freebsd_squid18.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 828-1 (squid) File : nvt/deb_828_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
19607 | Squid Crafted NTLM Authentication Header DoS |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Squid authentication headers handling denial of service attempt RuleID : 17371 - Revision : 11 - Type : SERVER-WEBAPP |
2014-01-10 | Squid authentication headers handling denial of service attempt RuleID : 17370 - Revision : 13 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-07-05 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0052.nasl - Type : ACT_GATHER_INFO |
2006-07-03 | Name : The remote CentOS host is missing a security update. File : centos_RHSA-2006-0045.nasl - Type : ACT_GATHER_INFO |
2006-05-13 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_44e7764c261411da9e1ec296ac722cb3.nasl - Type : ACT_GATHER_INFO |
2006-03-16 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0045.nasl - Type : ACT_GATHER_INFO |
2006-03-08 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2006-0052.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-192-1.nasl - Type : ACT_GATHER_INFO |
2005-10-19 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2005-181.nasl - Type : ACT_GATHER_INFO |
2005-10-12 | Name : The remote web proxy server is prone to denial of service attacks. File : squid_ntlm_dos.nasl - Type : ACT_DENIAL |
2005-10-05 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-828.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:50 |
|