Ubuntu 724-1: Squid vulnerability

    Date26 Feb 2009
    CategoryUbuntu
    54
    Posted ByLinuxSecurity Advisories
    Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered that Squid didnot properly validate the HTTP version when processing requests. A remoteattacker could exploit this to cause a denial of service (assertion failure). [More...]
    ===========================================================
    Ubuntu Security Notice USN-724-1          February 25, 2009
    squid vulnerability
    CVE-2009-0478
    ===========================================================
    
    A security issue affects the following Ubuntu releases:
    
    Ubuntu 8.10
    
    This advisory also applies to the corresponding versions of
    Kubuntu, Edubuntu, and Xubuntu.
    
    The problem can be corrected by upgrading your system to the
    following package versions:
    
    Ubuntu 8.10:
      squid                           2.7.STABLE3-1ubuntu2.1
    
    In general, a standard system upgrade is sufficient to effect the
    necessary changes.
    
    Details follow:
    
    Joshua Morin, Mikko Varpiola and Jukka Taimisto discovered that Squid did
    not properly validate the HTTP version when processing requests. A remote
    attacker could exploit this to cause a denial of service (assertion failure).
    
    
    Updated packages for Ubuntu 8.10:
    
      Source archives:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1.diff.gz
          Size/MD5:   303042 9132293f589a71ae3f771e1ae6de30f1
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1.dsc
          Size/MD5:     1252 6953f88d6f4825daabd9e77bd0fa1a88
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3.orig.tar.gz
          Size/MD5:  1782040 a4d7608696e2b617aa5853c7d23e25b0
    
      Architecture independent packages:
    
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid-common_2.7.STABLE3-1ubuntu2.1_all.deb
          Size/MD5:   495876 b6d1e76b140c792297c14382a06ed3e3
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_amd64.deb
          Size/MD5:   771610 7f2ca95b0497cc23f0bf26b7a6503cc7
        http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_amd64.deb
          Size/MD5:   119880 27ff06a902debe143acb7b3959fb1c52
    
      i386 architecture (x86 compatible Intel/AMD):
    
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_i386.deb
          Size/MD5:   695708 312c710ebdb46e3017b02cb672d14524
        http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_i386.deb
          Size/MD5:   118638 f2f2f698523d49d8971c7a22faebc427
    
      lpia architecture (Low Power Intel Architecture):
    
        http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_lpia.deb
          Size/MD5:   694080 6720b3aca93aabb7600a1a2c2f699af5
        http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_lpia.deb
          Size/MD5:   118550 7484981bd7c4c8b6361362e98d5d1631
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_powerpc.deb
          Size/MD5:   777958 b9d530e92ad4638fb8d169ef55eb33f4
        http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_powerpc.deb
          Size/MD5:   120446 9899cd403bbca3e0e6f5a936cd2d9955
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        http://ports.ubuntu.com/pool/main/s/squid/squid_2.7.STABLE3-1ubuntu2.1_sparc.deb
          Size/MD5:   719088 2781d6fd1c7adc0b76aa12670ac1abb5
        http://ports.ubuntu.com/pool/universe/s/squid/squid-cgi_2.7.STABLE3-1ubuntu2.1_sparc.deb
          Size/MD5:   119398 8a26b4da728c31d7bd116666191575b2
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.