|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2004:462|
|Summary:||Redhat Security Advisory RHSA-2004:462|
The remote host is missing updates announced in
Squid is a full-featured Web proxy cache.
An out of bounds memory read bug was found within the NTLM authentication
helper routine. If Squid is configured to use the NTLM authentication
helper, a remote attacker could send a carefully crafted NTLM
authentication packet and cause Squid to crash. The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0832
to this issue.
Note: The NTLM authentication helper is not enabled by default in Red Hat
Enterprise Linux 3. Red Hat Enterprise Linux 2.1 is not vulnerable to this
issue as it shipped with a version of Squid which did not contain the
Users of Squid should update to this erratum package, which contains a
backported patch and is not vulnerable to this issue.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Medium
BugTraq ID: 11098|
Common Vulnerability Exposure (CVE) ID: CVE-2004-0832
XForce ISS Database: squid-ntlmssp-dos(17218)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.