Executive Summary

Summary
Title Squid vulnerability
Informations
Name USN-192-1 First vendor Publication 2005-09-30
Vendor Ubuntu Last vendor Modification 2005-09-30
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog)

The following packages are affected:

squid

The problem can be corrected by upgrading the affected package to version 2.5.5-6ubuntu0.11 (for Ubuntu 4.10), or 2.5.8-3ubuntu1.4 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Mike Diggins discovered a remote Denial of Service vulnerability in Squid. Sending specially crafted NTML authentication requests to Squid caused the server to crash.

Original Source

Url : http://www.ubuntu.com/usn/USN-192-1

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11580
 
Oval ID: oval:org.mitre.oval:def:11580
Title: Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
Description: Squid 2.5.STABLE10 and earlier, while performing NTLM authentication, does not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).
Family: unix Class: vulnerability
Reference(s): CVE-2005-2917
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 62

OpenVAS Exploits

Date Description
2009-10-10 Name : SLES9: Security update for squid
File : nvt/sles9p5017904.nasl
2008-09-04 Name : FreeBSD Ports: squid
File : nvt/freebsd_squid18.nasl
2008-01-17 Name : Debian Security Advisory DSA 828-1 (squid)
File : nvt/deb_828_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
19607 Squid Crafted NTLM Authentication Header DoS

Snort® IPS/IDS

Date Description
2014-01-10 Squid authentication headers handling denial of service attempt
RuleID : 17371 - Revision : 11 - Type : SERVER-WEBAPP
2014-01-10 Squid authentication headers handling denial of service attempt
RuleID : 17370 - Revision : 13 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2006-07-05 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2006-0052.nasl - Type : ACT_GATHER_INFO
2006-07-03 Name : The remote CentOS host is missing a security update.
File : centos_RHSA-2006-0045.nasl - Type : ACT_GATHER_INFO
2006-05-13 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_44e7764c261411da9e1ec296ac722cb3.nasl - Type : ACT_GATHER_INFO
2006-03-16 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2006-0045.nasl - Type : ACT_GATHER_INFO
2006-03-08 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2006-0052.nasl - Type : ACT_GATHER_INFO
2006-01-15 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-192-1.nasl - Type : ACT_GATHER_INFO
2005-10-19 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2005-181.nasl - Type : ACT_GATHER_INFO
2005-10-12 Name : The remote web proxy server is prone to denial of service attacks.
File : squid_ntlm_dos.nasl - Type : ACT_DENIAL
2005-10-05 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-828.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:02:20
  • Multiple Updates