Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51028
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2004:133
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2004:133.

Squid is a full-featured Web proxy cache.

A bug was found in the processing of %-encoded characters in a URL in
versions of Squid 2.5.STABLE4 and earlier. If a Squid configuration uses
Access Control Lists (ACLs), a remote attacker could create URLs that would
not be correctly tested against Squid's ACLs, potentially allowing clients
to access prohibited URLs.

Users of Squid should update to these erratum packages which are not
vulnerable to this issue.

In addition, these packages contain a new Access Control type, urllogin,
which can be used to protect vulnerable Microsoft Internet Explorer clients
from accessing URLs that contain login information. Such URLs are often
used by fraudsters to trick web users into revealing valuable personal data.

Note that the default Squid configuration does not make use of this new
access control type. You must explicitly configure Squid with ACLs that
use this new type, in accordance with your own site policies.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2004-133.html
http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
http://www.microsoft.com/security/incident/spoof.asp

Risk factor : High

CVSS Score:
7.5

Cross-Ref: BugTraq ID: 9778
Common Vulnerability Exposure (CVE) ID: CVE-2004-0189
http://www.securityfocus.com/bid/9778
Bugtraq: 20040401 [OpenPKG-SA-2004.008] OpenPKG Security Advisory (squid) (Google Search)
http://marc.info/?l=bugtraq&m=108084935904110&w=2
Conectiva Linux advisory: CLA-2004:838
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000838
Debian Security Information: DSA-474 (Google Search)
http://www.debian.org/security/2004/dsa-474
http://security.gentoo.org/glsa/glsa-200403-11.xml
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:025
http://www.osvdb.org/5916
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A877
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A941
http://www.redhat.com/support/errata/RHSA-2004-133.html
http://www.redhat.com/support/errata/RHSA-2004-134.html
SCO Security Bulletin: SCOSA-2005.16
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt
SGI Security Advisory: 20040404-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040404-01-U.asc
XForce ISS Database: squid-urlregex-acl-bypass(15366)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15366
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.