Linux Security
Linux Security
Linux Security

Debian: squid fix denial of service DSA-651-1

Date 20 Jan 2005
Posted By Joe Shakespeare
Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 651-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Martin Schulze
January 20th, 2005            
- --------------------------------------------------------------------------

Package        : squid
Vulnerability  : buffer overflow, integer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-0094 CAN-2005-0095

Several vulnerabilities have been discovered in Squid, the internet
object cache, the popular WWW proxy cache.  The Common Vulnerabilities
and Exposures Project identifies the following vulnerabilities:


    "infamous41md" discovered a buffer overflow in the parser for
    Gopher responses which will lead to memory corruption and usually
    crash Squid.


    "infamous41md" discovered an integer overflow in the receiver of
    WCCP (Web Cache Communication Protocol) messages.  An attacker
    could send a specially crafted UDP datagram that will cause Squid
    to crash.

For the stable distribution (woody) these problems have been fixed in
version 2.4.6-2woody5.

For the unstable distribution (sid) these problems have been fixed in
version 2.5.7-4.

We recommend that you upgrade your squid package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      612 69bd41324bb88cc4a76fcacba1f6cb9b
      Size/MD5 checksum:   227846 52f6d82e486f23dba4240260dc64ea57
      Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228

  Alpha architecture:
      Size/MD5 checksum:   814804 684a7a602a7dce53d3e2d5ea526cdfeb
      Size/MD5 checksum:    75340 061412b8ca998b1ae5a7c576eac51425
      Size/MD5 checksum:    60094 8ecf3345226d4023c661cb5950929d5c

  ARM architecture:
      Size/MD5 checksum:   725286 b9103ba40dfcc47200b971a0ad123bb9
      Size/MD5 checksum:    73116 fe083c2e4e65e0bcff82b42c292f9c69
      Size/MD5 checksum:    58444 225728ea1d83a4f999cbcd1cbc918471

  Intel IA-32 architecture:
      Size/MD5 checksum:   684376 bd4f50309316282ffdf9012e6a051349
      Size/MD5 checksum:    72850 f0f790e828a53ae94406c68d8c386ac7
      Size/MD5 checksum:    58014 9f2e5d189aa0df9d01d47c6870ca25f9

  Intel IA-64 architecture:
      Size/MD5 checksum:   953366 146cb3cfadbb09b473289462fcb85c4e
      Size/MD5 checksum:    79224 6a83889272e28d86602d86358929196b
      Size/MD5 checksum:    62766 6b48ca53c8bc2f0972a1b4653d04fa54

  HP Precision architecture:
      Size/MD5 checksum:   779204 684c9f7e7b7bd4abda5eda0890974951
      Size/MD5 checksum:    74562 861f28d3d058c56d620ce557b488780f
      Size/MD5 checksum:    59574 16d03b269cb3d067cd6129b9bf1eccdc

  Motorola 680x0 architecture:
      Size/MD5 checksum:   665532 da4701e4506c91a7297ebe41314d88cd
      Size/MD5 checksum:    72460 3ad96b1dc107bbaafd67592f8477bab4
      Size/MD5 checksum:    57678 0202dafa52ea24eb34c3d477459ad287

  Big endian MIPS architecture:
      Size/MD5 checksum:   764854 c97c148f54c9d80e9d3d6c127894813b
      Size/MD5 checksum:    74028 d49e9634ed353d8b713f4d80de731b61
      Size/MD5 checksum:    58730 762b4bb651f8531208db4cd941a06560

  Little endian MIPS architecture:
      Size/MD5 checksum:   764702 d134fdcf4916a521147f94837e2e544e
      Size/MD5 checksum:    74118 9bdfc6bc5e7f752df213cdffb197f877
      Size/MD5 checksum:    58838 edc757de19a59274fcb2a3d32791dcc0

  PowerPC architecture:
      Size/MD5 checksum:   722068 9c18747e4a7e6b15c05ab547efc59993
      Size/MD5 checksum:    73100 7af618b2b8b1e225af2631a07da615d8
      Size/MD5 checksum:    58322 23f79cf266df794a375ba75b2a973026

  IBM S/390 architecture:
      Size/MD5 checksum:   711584 f750ce9dd12460574b2c69031d3933bf
      Size/MD5 checksum:    73442 e9a485219baaec097b7d432ba4ea8a26
      Size/MD5 checksum:    58876 4ab64ae10b353e69facfcc59fa6fa0ab

  Sun Sparc architecture:
      Size/MD5 checksum:   724314 d4af1a337ee603d7b1039f132996b0bf
      Size/MD5 checksum:    75728 9974f32b84edb4969c9216742e9c9f73
      Size/MD5 checksum:    60762 a7aad73eabef840dd648ef058dc852d5

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"43","type":"x","order":"1","pct":81.13,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"5","type":"x","order":"2","pct":9.43,"resources":[]},{"id":"181","title":"Hardly ever","votes":"5","type":"x","order":"3","pct":9.43,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.



bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.