Linux Security
    Linux Security
    Linux Security

    Debian: squid fix denial of service DSA-651-1

    Date 20 Jan 2005
    Posted By Joe Shakespeare
    Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 651-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
    January 20th, 2005            
    - --------------------------------------------------------------------------
    Package        : squid
    Vulnerability  : buffer overflow, integer overflow
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2005-0094 CAN-2005-0095
    Several vulnerabilities have been discovered in Squid, the internet
    object cache, the popular WWW proxy cache.  The Common Vulnerabilities
    and Exposures Project identifies the following vulnerabilities:
        "infamous41md" discovered a buffer overflow in the parser for
        Gopher responses which will lead to memory corruption and usually
        crash Squid.
        "infamous41md" discovered an integer overflow in the receiver of
        WCCP (Web Cache Communication Protocol) messages.  An attacker
        could send a specially crafted UDP datagram that will cause Squid
        to crash.
    For the stable distribution (woody) these problems have been fixed in
    version 2.4.6-2woody5.
    For the unstable distribution (sid) these problems have been fixed in
    version 2.5.7-4.
    We recommend that you upgrade your squid package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      612 69bd41324bb88cc4a76fcacba1f6cb9b
          Size/MD5 checksum:   227846 52f6d82e486f23dba4240260dc64ea57
          Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228
      Alpha architecture:
          Size/MD5 checksum:   814804 684a7a602a7dce53d3e2d5ea526cdfeb
          Size/MD5 checksum:    75340 061412b8ca998b1ae5a7c576eac51425
          Size/MD5 checksum:    60094 8ecf3345226d4023c661cb5950929d5c
      ARM architecture:
          Size/MD5 checksum:   725286 b9103ba40dfcc47200b971a0ad123bb9
          Size/MD5 checksum:    73116 fe083c2e4e65e0bcff82b42c292f9c69
          Size/MD5 checksum:    58444 225728ea1d83a4f999cbcd1cbc918471
      Intel IA-32 architecture:
          Size/MD5 checksum:   684376 bd4f50309316282ffdf9012e6a051349
          Size/MD5 checksum:    72850 f0f790e828a53ae94406c68d8c386ac7
          Size/MD5 checksum:    58014 9f2e5d189aa0df9d01d47c6870ca25f9
      Intel IA-64 architecture:
          Size/MD5 checksum:   953366 146cb3cfadbb09b473289462fcb85c4e
          Size/MD5 checksum:    79224 6a83889272e28d86602d86358929196b
          Size/MD5 checksum:    62766 6b48ca53c8bc2f0972a1b4653d04fa54
      HP Precision architecture:
          Size/MD5 checksum:   779204 684c9f7e7b7bd4abda5eda0890974951
          Size/MD5 checksum:    74562 861f28d3d058c56d620ce557b488780f
          Size/MD5 checksum:    59574 16d03b269cb3d067cd6129b9bf1eccdc
      Motorola 680x0 architecture:
          Size/MD5 checksum:   665532 da4701e4506c91a7297ebe41314d88cd
          Size/MD5 checksum:    72460 3ad96b1dc107bbaafd67592f8477bab4
          Size/MD5 checksum:    57678 0202dafa52ea24eb34c3d477459ad287
      Big endian MIPS architecture:
          Size/MD5 checksum:   764854 c97c148f54c9d80e9d3d6c127894813b
          Size/MD5 checksum:    74028 d49e9634ed353d8b713f4d80de731b61
          Size/MD5 checksum:    58730 762b4bb651f8531208db4cd941a06560
      Little endian MIPS architecture:
          Size/MD5 checksum:   764702 d134fdcf4916a521147f94837e2e544e
          Size/MD5 checksum:    74118 9bdfc6bc5e7f752df213cdffb197f877
          Size/MD5 checksum:    58838 edc757de19a59274fcb2a3d32791dcc0
      PowerPC architecture:
          Size/MD5 checksum:   722068 9c18747e4a7e6b15c05ab547efc59993
          Size/MD5 checksum:    73100 7af618b2b8b1e225af2631a07da615d8
          Size/MD5 checksum:    58322 23f79cf266df794a375ba75b2a973026
      IBM S/390 architecture:
          Size/MD5 checksum:   711584 f750ce9dd12460574b2c69031d3933bf
          Size/MD5 checksum:    73442 e9a485219baaec097b7d432ba4ea8a26
          Size/MD5 checksum:    58876 4ab64ae10b353e69facfcc59fa6fa0ab
      Sun Sparc architecture:
          Size/MD5 checksum:   724314 d4af1a337ee603d7b1039f132996b0bf
          Size/MD5 checksum:    75728 9974f32b84edb4969c9216742e9c9f73
          Size/MD5 checksum:    60762 a7aad73eabef840dd648ef058dc852d5
      These files will probably be moved into the stable distribution on
      its next update.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.