Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.56371
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2006:0052
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0052.

Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects.

A denial of service flaw was found in the way squid processes certain NTLM
authentication requests. It is possible for a remote attacker to crash the
Squid server by sending a specially crafted NTLM authentication request.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2005-2917 to this issue.

The following issues have also been fixed in this update:

* An error introduced in squid-2.5.STABLE6-3.4E.12 can crash Squid when a
user visits a site that has a bit longer DNS record.

* An error introduced in the old package prevented Squid from returning
correct information about large file systems. The new package is compiled
with the IDENT lookup support so that users who want to use it do not
have to recompile it.

* Some authentication helpers needed SETUID rights but did not have them.
If administrators wanted to use cache administrator, they had to change
the SETUID bit manually. The updated package sets this bit so the new
package can be updated without manual intervention from administrators.

* Squid could not handle a reply from an HTTP server when the reply began
with the new-line character.

* An issue was discovered when a reply from an HTTP server was not
HTTP 1.0 or 1.1 compliant.

* The updated package keeps user-defined error pages when the package
is updated and it adds new ones.

All users of squid should upgrade to this updated package, which resolves
these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0052.html

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: BugTraq ID: 14977
Common Vulnerability Exposure (CVE) ID: CVE-2005-2917
1014920
http://securitytracker.com/id?1014920
14977
http://www.securityfocus.com/bid/14977
16992
http://secunia.com/advisories/16992
17015
http://secunia.com/advisories/17015
17050
http://secunia.com/advisories/17050
17177
http://secunia.com/advisories/17177
19161
http://secunia.com/advisories/19161
19532
http://secunia.com/advisories/19532
19607
http://www.osvdb.org/19607
20060401-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
DSA-828
http://www.debian.org/security/2005/dsa-828
FLSA-2006:152809
http://fedoranews.org/updates/FEDORA--.shtml
MDKSA-2005:181
http://www.mandriva.com/security/advisories?name=MDKSA-2005:181
RHSA-2006:0045
http://www.redhat.com/support/errata/RHSA-2006-0045.html
RHSA-2006:0052
http://www.redhat.com/support/errata/RHSA-2006-0052.html
SCOSA-2005.49
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
SUSE-SR:2005:027
http://www.novell.com/linux/security/advisories/2005_27_sr.html
USN-192-1
http://www.ubuntu.com/usn/usn-192-1/
oval:org.mitre.oval:def:11580
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11580
squid-ntlm-authentication-dos(24282)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24282
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.