|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2002:130|
|Summary:||Redhat Security Advisory RHSA-2002:130|
The remote host is missing updates announced in
New Squid packages are available which fix various issues.
Squid is a high-performance proxy caching server. The following script_summary(
describes the various issues found and fixed:
Several buffer overflows have been found in the MSTN auth helper
(msnt_auth) when configured to use denyusers or allowusers access control
Several buffer overflows were found in the gopher client of Squid. It
could be possible for a malicious gopher server to cause Squid to crash.
A problem was found in the handling of the FTP data channel, possibly
allowing abuse of the FTP proxy to bypass firewall rules or inject false
Several possible buffer overflows were found in the code parsing FTP
directories, which potentially allow for an untrusted FTP server to crash
Thanks go to Olaf Kirch and the Squid team for notifying us of the
problems and to the Squid team for providing patches.
All users of Squid are advised to upgrade to these errata packages which
contain patches to correct each of these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : High
Common Vulnerability Exposure (CVE) ID: CVE-2002-0713|
RedHat Security Advisories: RHSA-2002:051
RedHat Security Advisories: RHSA-2002:130
SuSE Security Announcement: SuSE-SA:2002:025 (Google Search)
Caldera Security Advisory: CSSA-2002-046.0
Conectiva Linux advisory: CLA-2002:506
Bugtraq: 20020715 TSLSA-2002-0062 - squid (Google Search)
BugTraq ID: 5155
BugTraq ID: 5156
BugTraq ID: 5157
Common Vulnerability Exposure (CVE) ID: CVE-2002-0715
BugTraq ID: 5154
Common Vulnerability Exposure (CVE) ID: CVE-2002-0714
BugTraq ID: 5158
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 50192 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.