Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.52116
Categoría:Conectiva Local Security Checks
Título:Conectiva Security Advisory CLA-2005:948
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory CLA-2005:948.

Squid[1] is a full-featured web proxy cache.

This announcement upgrades Squid from 2.5STABLE5 to 2.5STABLE9 in
order to fix bug #13718[2] and also fixes the two following
vulnerabilities:

1.Unexpected access control results on configuration errors[3]
On configuration errors involving wrongly defined or missing acls
the http_access results may be different than expected, possibly
allowing more access than intended. This patch makes such
configuration errors a fatal error, preventing the service from
starting until the access control configuration errors have been
corrected.

2.Race condition related to Set-Cookie header[4]
A race window has been discovered where Set-Cookie headers may leak
to another users if the requested server relies on the old (obsolete
since 1997) Netscape Set-Cookie specifications in how caches should
handle the Set-Cookie header on otherwise cacheable content.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.squid-cache.org/
http://bugzilla.conectiva.com.br/show_bug.cgi?id=13718
http://www1.uk.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-acl_error
http://www1.uk.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-setcookie
http://www.securityspace.com/smysecure/catid.html?in=CLA-2005:948
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000948

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.