|Category:||Red Hat Local Security Checks|
|Title:||RedHat Security Advisory RHSA-2006:0045|
The remote host is missing updates announced in
Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects.
A denial of service flaw was found in the way squid processes certain NTLM
authentication requests. A remote attacker could send a specially crafted
NTLM authentication request which would cause the Squid server to crash.
The Common Vulnerabilities and Exposures project assigned the name
CVE-2005-2917 to this issue.
Several bugs have also been addressed in this update:
* An error introduced in 2.5.STABLE3-6.3E.14 where Squid can crash if a
user visits a site which has a long DNS record.
* Some authentication helpers were missing needed setuid rights.
* Squid couldn't handle a reply from a HTTP server when the reply began
with the new-line character or wasn't HTTP/1.0 or HTTP/1.1 compliant.
* User-defined error pages were not kept when the squid package was upgraded.
All users of squid should upgrade to these updated packages, which contain
backported patches to resolve these issues.
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date
Risk factor : Medium
BugTraq ID: 14977|
Common Vulnerability Exposure (CVE) ID: CVE-2005-2917
Debian Security Information: DSA-828 (Google Search)
SCO Security Bulletin: SCOSA-2005.49
SGI Security Advisory: 20060401-01-U
SuSE Security Announcement: SUSE-SR:2005:027 (Google Search)
XForce ISS Database: squid-ntlm-authentication-dos(24282)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.