Descripción: | Description:
The remote host is missing updates announced in advisory RHSA-2005:060.
A number of vulnerabilities have been discovered in Squid, including:
- A buffer overflow flaw was found in the Gopher relay parser. - An integer overflow flaw was found in the WCCP message parser. - A memory leak was found in the NTLM fakeauth_auth helper. - A NULL pointer de-reference bug was found in the NTLM fakeauth_auth helper. - A username validation bug was found in squid_ldap_auth. - The way Squid handles HTTP responses was found to need strengthening. - A bug was found in the way Squid handled oversized HTTP response headers. - A buffer overflow bug was found in the WCCP message parser.
For full details on these issues, please visit the referenced advisories listed below.
Users of Squid should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues.
Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date
http://rhn.redhat.com/errata/RHSA-2005-060.html http://www.squid-cache.org/Advisories/SQUID-2005_1.txt http://www.squid-cache.org/Advisories/SQUID-2005_2.txt http://www.squid-cache.org/Advisories/SQUID-2005_3.txt http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_auth http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
Risk factor : High
CVSS Score: 7.5
|