|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-129-1 (squid)|
|Summary:||Ubuntu USN-129-1 (squid)|
The remote host is missing an update to squid
announced via advisory USN-129-1.
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
The following packages are affected: squid
It was discovered that Squid did not verify the validity of DNS server
responses. When Squid is started, it opens a DNS client UDP port whose
number is randomly assigned by the operating system. Unless your
network firewall is configured to accept DNS responses only from known
good nameservers, this vulnerability allowed users within the local
network to inject arbitrary DNS responses into Squid (DNS spoofing).
This could be used to present different web pages to users from those
they actually requested.
The problem can be corrected by upgrading the affected package to
version 2.5.5-6ubuntu0.9 (for Ubuntu 4.10), or 2.5.8-3ubuntu1.2 (for
Ubuntu 5.04). In general, a standard system upgrade is sufficient to
effect the necessary changes.
Risk factor : High
BugTraq ID: 13592|
Common Vulnerability Exposure (CVE) ID: CVE-2005-1519
Debian Security Information: DSA-751 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 49323 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.