Linux Security
    Linux Security
    Linux Security

    Debian: squid ACL bypass vulnerability

    Date 05 Apr 2004
    Posted By LinuxSecurity Advisories
    A URL can be crafted to be ignored (and automatically pass) by Squid's ACL system.
    Debian Security Advisory DSA 474-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    April 3rd, 2004                
    - --------------------------------------------------------------------------
    Package        : squid
    Problem-Type   : ACL bypass
    Debian-specific: no
    CVE Ids        : CAN-2004-0189
    A vulnerability was discovered in squid, an Internet object cache,
    whereby access control lists based on URLs could be bypassed
    (CAN-2004-0189).  Two other bugs were also fixed with patches
    squid-2.4.STABLE7-url_escape.patch (a buffer overrun which does not
    appear to be exploitable) and squid-2.4.STABLE7-url_port.patch (a
    potential denial of service).
    For the stable distribution (woody) these problems have been fixed in
    version 2.4.6-2woody2.
    For the unstable distribution (sid) these problems have been fixed in
    version 2.5.5-1.
    We recommend that you update your squid package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      621 d61b7bf783830f071f5f091db85864aa
          Size/MD5 checksum:   224311 e1fbff609b3957f2f0a834fe5ffba8dd
          Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228
      Alpha architecture:
          Size/MD5 checksum:   814744 342a3a95c73aa998461bb7519f1b6d6a
          Size/MD5 checksum:    75134 574f070f7a7fbd6a43246b42a1db9a39
          Size/MD5 checksum:    59926 c93d20eeb1563fb78c5085453abebd4b
      ARM architecture:
          Size/MD5 checksum:   724730 3b83ffa98670b7f9fe8eb431cd7e479b
          Size/MD5 checksum:    72542 efd5e8842815d2928d5bd4033907dce0
          Size/MD5 checksum:    58278 f436043d4b1139179af520a7a6b1b8d6
      Intel IA-32 architecture:
          Size/MD5 checksum:   698508 0aedc49b881f8d780c55290e09924efe
          Size/MD5 checksum:    72896 3277f9f2a974093b22d85dcbe8fd86ff
          Size/MD5 checksum:    57538 ccf05d0a3027e2f54253b023f139005e
      Intel IA-64 architecture:
          Size/MD5 checksum:   952742 e4e67ae336927d9816941016eeccccea
          Size/MD5 checksum:    78324 19c0e74ae46fe1f158cf7988c4e9bb1b
          Size/MD5 checksum:    62594 6cb77e23ac2d571d6e9c9ca9b993ed2b
      HP Precision architecture:
          Size/MD5 checksum:   778878 f39bf46bd07598ba48783eb8ddd392a7
          Size/MD5 checksum:    73912 f315c3aba6b2e47f8ab96741cdb0738a
          Size/MD5 checksum:    59422 329334888b68fed99760a6f2749010b1
      Motorola 680x0 architecture:
          Size/MD5 checksum:   664804 d3e929ea6f786b8791ce20077ef62872
          Size/MD5 checksum:    71856 535cd33a38f10d8813bbfab75591b956
          Size/MD5 checksum:    57496 63e90d2bda866227a745fcad95c45d5a
      Big endian MIPS architecture:
          Size/MD5 checksum:   764688 c6eefe3b6f9b8b4f5df943baa6a7a5dd
          Size/MD5 checksum:    73436 d5e34594b15e52097a84f5dabd3ec100
          Size/MD5 checksum:    58584 d9a275f87449d3531c302b531091800c
      Little endian MIPS architecture:
          Size/MD5 checksum:   763980 9f987ecd9a8ff462dbf1263739f1b8f1
          Size/MD5 checksum:    73432 e8b9c5bd013b013c6e859dc3af31dd0e
          Size/MD5 checksum:    58566 0b4cce0a9c8f989259dae10cf7fe957d
      PowerPC architecture:
          Size/MD5 checksum:   721636 0d9260b21bca35c26ed15d9a423d469f
          Size/MD5 checksum:    72498 b323cd2d039903ae92c0b433062ef376
          Size/MD5 checksum:    58170 19070ddbd50f03df0d0d9d0a4832781c
      IBM S/390 architecture:
          Size/MD5 checksum:   711180 80e6122e4505a03aa0ebee9993fb5c18
          Size/MD5 checksum:    72856 0b79555fe254218e3a159b23065f949c
          Size/MD5 checksum:    58718 de157f9dad34a4f28b2b41c6562ea2f1
      Sun Sparc architecture:
          Size/MD5 checksum:   723914 f3465e678067c079e1e9e2d4abca0cca
          Size/MD5 checksum:    75184 2e49570a56c5741aa3190b473e6ec920
          Size/MD5 checksum:    60592 eba58b5789a7eca6c7d91ff4a7f7c2fb
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and


    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.