|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 1482-1 (squid)|
The remote host is missing an update to squid
announced via advisory DSA 1482-1.
It was discovered that malformed cache update replies against the Squid
WWW proxy cache could lead to the exhaustion of system memory, resulting
in potential denial of service.
For the stable distribution (etch), this problem has been fixed in
For the old stable distribution (sarge), the update cannot currently
be processed on the buildd security network due to a bug in the archive
management script. This will be resolved soon. An update for i386
is temporarily available at at http://people.debian.org/~
We recommend that you upgrade your squid packages.
Common Vulnerability Exposure (CVE) ID: CVE-2007-6239|
BugTraq ID: 26687
CERT/CC vulnerability note: VU#232881
Debian Security Information: DSA-1482 (Google Search)
SuSE Security Announcement: SUSE-SR:2008:001 (Google Search)
|Copyright||Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.