Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56371
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2006:0052
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2006:0052.

Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects.

A denial of service flaw was found in the way squid processes certain NTLM
authentication requests. It is possible for a remote attacker to crash the
Squid server by sending a specially crafted NTLM authentication request.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2005-2917 to this issue.

The following issues have also been fixed in this update:

* An error introduced in squid-2.5.STABLE6-3.4E.12 can crash Squid when a
user visits a site that has a bit longer DNS record.

* An error introduced in the old package prevented Squid from returning
correct information about large file systems. The new package is compiled
with the IDENT lookup support so that users who want to use it do not
have to recompile it.

* Some authentication helpers needed SETUID rights but did not have them.
If administrators wanted to use cache administrator, they had to change
the SETUID bit manually. The updated package sets this bit so the new
package can be updated without manual intervention from administrators.

* Squid could not handle a reply from an HTTP server when the reply began
with the new-line character.

* An issue was discovered when a reply from an HTTP server was not
HTTP 1.0 or 1.1 compliant.

* The updated package keeps user-defined error pages when the package
is updated and it adds new ones.

All users of squid should upgrade to this updated package, which resolves
these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2006-0052.html

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: BugTraq ID: 14977
Common Vulnerability Exposure (CVE) ID: CVE-2005-2917
http://www.securityfocus.com/bid/14977
Debian Security Information: DSA-828 (Google Search)
http://www.debian.org/security/2005/dsa-828
http://fedoranews.org/updates/FEDORA--.shtml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:181
http://www.osvdb.org/19607
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11580
http://www.redhat.com/support/errata/RHSA-2006-0045.html
http://www.redhat.com/support/errata/RHSA-2006-0052.html
SCO Security Bulletin: SCOSA-2005.49
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.49/SCOSA-2005.49.txt
http://securitytracker.com/id?1014920
http://secunia.com/advisories/16992
http://secunia.com/advisories/17015
http://secunia.com/advisories/17050
http://secunia.com/advisories/17177
http://secunia.com/advisories/19161
http://secunia.com/advisories/19532
SGI Security Advisory: 20060401-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
SuSE Security Announcement: SUSE-SR:2005:027 (Google Search)
http://www.novell.com/linux/security/advisories/2005_27_sr.html
http://www.ubuntu.com/usn/usn-192-1/
XForce ISS Database: squid-ntlm-authentication-dos(24282)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24282
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.