CVE-2002-0713
CVSS7.5
发布时间 :2002-07-26 00:00:00
修订时间 :2016-10-17 22:21:42
NMCOS    

[原文]Buffer overflows in Squid before 2.4.STABLE6 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code (1) via the MSNT auth helper (msnt_auth) when using denyusers or allowusers files, (2) via the gopher client, or (3) via the FTP server directory listing parser when HTML output is generated.


[CNNVD]Squid MSNT Auth Helper远程缓冲区溢出漏洞(CNNVD-200207-093)

        
        Squid是一款免费开放源代码WEB代理软件,可使用在Unix、Linux、Microsoft Windows操作系统下。
        Squid MSNT auth helper组件存在漏洞,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        当Squid使用msnt_auth配置用于拒绝用户或者允许用户访问控制文件时,MSTN auth helper存在缓冲区溢出攻击,远程攻击者可能以Squid进程的权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0713
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0713
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200207-093
(官方数据源) CNNVD

- 其它链接及资源

ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-046.0.txt
(UNKNOWN)  CALDERA  CSSA-2002-046.0
http://marc.info/?l=bugtraq&m=102674543407606&w=2
(UNKNOWN)  BUGTRAQ  20020715 TSLSA-2002-0062 - squid
http://rhn.redhat.com/errata/RHSA-2002-051.html
(UNKNOWN)  REDHAT  RHSA-2002:051
http://rhn.redhat.com/errata/RHSA-2002-130.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2002:130
http://www.iss.net/security_center/static/9480.php
(UNKNOWN)  XF  squid-gopher-bo(9480)
http://www.iss.net/security_center/static/9481.php
(UNKNOWN)  XF  squid-ftp-dir-bo(9481)
http://www.iss.net/security_center/static/9482.php
(UNKNOWN)  XF  squid-msnt-helper-bo(9482)
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-044.php
(PATCH)  MANDRAKE  MDKSA-2002:044
http://www.securityfocus.com/bid/5155
(UNKNOWN)  BID  5155
http://www.securityfocus.com/bid/5156
(UNKNOWN)  BID  5156
http://www.securityfocus.com/bid/5157
(UNKNOWN)  BID  5157
http://www.squid-cache.org/Advisories/SQUID-2002_3.txt
(VENDOR_ADVISORY)  CONFIRM  http://www.squid-cache.org/Advisories/SQUID-2002_3.txt
http://www.squid-cache.org/Versions/v2/2.4/bugs/
(PATCH)  CONFIRM  http://www.squid-cache.org/Versions/v2/2.4/bugs/

- 漏洞信息

Squid MSNT Auth Helper远程缓冲区溢出漏洞
高危 边界条件错误
2002-07-26 00:00:00 2005-10-20 00:00:00
远程  
        
        Squid是一款免费开放源代码WEB代理软件,可使用在Unix、Linux、Microsoft Windows操作系统下。
        Squid MSNT auth helper组件存在漏洞,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击。
        当Squid使用msnt_auth配置用于拒绝用户或者允许用户访问控制文件时,MSTN auth helper存在缓冲区溢出攻击,远程攻击者可能以Squid进程的权限在系统上执行任意指令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时没有合适的临时解决方法。
        厂商补丁:
        Conectiva
        ---------
        Conectiva已经为此发布了一个安全公告(CLA-2002:506)以及相应补丁:
        CLA-2002:506:squid
        链接:
        http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000506

        补丁下载:
        ftp://atualizacoes.conectiva.com.br/6.0/RPMS/squid-2.4.7-1U60_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/squid-2.4.7-1U60_3cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/7.0/RPMS/squid-2.4.7-1U70_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/7.0/RPMS/squid-auth-2.4.7-1U70_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/7.0/RPMS/squid-doc-2.4.7-1U70_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/7.0/RPMS/squid-templates-2.4.7-1U70_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/squid-2.4.7-1U70_3cl.src.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/squid-2.4.7-1U8_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/squid-auth-2.4.7-1U8_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/squid-doc-2.4.7-1U8_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/RPMS/squid-templates-2.4.7-1U8_3cl.i386.rpm
        ftp://atualizacoes.conectiva.com.br/8/SRPMS/squid-2.4.7-1U8_3cl.src.rpm
        Conectiva Linux version 6.0及以上版本的用户可以使用apt进行RPM包的更新:
        - 把以下的文本行加入到/etc/apt/sources.list文件中:
        
        rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
        (如果你不是使用6.0版本,用合适的版本号代替上面的6.0)
        - 执行: apt-get update
        - 更新以后,再执行: apt-get upgrade
        National Science Foundation
        ---------------------------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        National Science Foundation Upgrade squid-2.4.STABLE7-src.tar.gz
        ftp://ftp.squid-cache.org/pub/squid-2/STABLE/squid-2.4.STABLE7-src.tar.gz
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2002:051-16)以及相应补丁:
        RHSA-2002:051-16:New Squid packages available
        链接:https://www.redhat.com/support/errata/RHSA-2002-051.html
        补丁下载:
        Red Hat Linux 6.2:
        SRPMS:
        ftp://updates.redhat.com/6.2/en/os/SRPMS/squid-2.4.STABLE6-6.6.2.src.rpm
        alpha:
        ftp://updates.redhat.com/6.2/en/os/alpha/squid-2.4.STABLE6-6.6.2.alpha.rpm
        i386:
        ftp://updates.redhat.com/6.2/en/os/i386/squid-2.4.STABLE6-6.6.2.i386.rpm
        sparc:
        ftp://updates.redhat.com/6.2/en/os/sparc/squid-2.4.STABLE6-6.6.2.sparc.rpm
        Red Hat Linux 7.0:
        SRPMS:
        ftp://updates.redhat.com/7.0/en/os/SRPMS/squid-2.4.STABLE6-6.7.0.src.rpm
        alpha:
        ftp://updates.redhat.com/7.0/en/os/alpha/squid-2.4.STABLE6-6.7.0.alpha.rpm
        i386:
        ftp://updates.redhat.com/7.0/en/os/i386/squid-2.4.STABLE6-6.7.0.i386.rpm
        Red Hat Linux 7.1:
        SRPMS:
        ftp://updates.redhat.com/7.1/en/os/SRPMS/squid-2.4.STABLE6-6.7.1.src.rpm
        alpha:
        ftp://updates.redhat.com/7.1/en/os/alpha/squid-2.4.STABLE6-6.7.1.alpha.rpm
        i386:
        ftp://updates.redhat.com/7.1/en/os/i386/squid-2.4.STABLE6-6.7.1.i386.rpm
        ia64:
        ftp://updates.redhat.com/7.1/en/os/ia64/squid-2.4.STABLE6-6.7.1.ia64.rpm
        Red Hat Linux 7.2:
        SRPMS:
        ftp://updates.redhat.com/7.2/en/os/SRPMS/squid-2.4.STABLE6-6.7.3.src.rpm
        i386:
        ftp://updates.redhat.com/7.2/en/os/i386/squid-2.4.STABLE6-6.7.3.i386.rpm
        ia64:
        ftp://updates.redhat.com/7.2/en/os/ia64/squid-2.4.STABLE6-6.7.3.ia64.rpm
        Red Hat Linux 7.3:
        SRPMS:
        ftp://updates.redhat.com/7.3/en/os/SRPMS/squid-2.4.STABLE6-6.7.3.src.rpm
        i386:
        ftp://updates.redhat.com/7.3/en/os/i386/squid-2.4.STABLE6-6.7.3.i386.rpm
        可使用下列命令安装补丁:
        rpm -Fvh [文件名]

- 漏洞信息

5917
Squid Proxy Gopher Client Unspecified Remote Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Squid Web Proxy Cache's Gopher Client contains several flaws that may allow for remote code execution. No further details have been provided.

- 时间线

2002-07-03 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.4.STABLE7 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Squid Gopher Proxy Buffer Overflow Vulnerability
Boundary Condition Error 5157
Yes No
2002-07-03 12:00:00 2009-07-11 02:56:00
Vulnerability discovery credited to Olaf Kirch.

- 受影响的程序版本

National Science Foundation Squid Web Proxy 2.4 STABLE6
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 8.2
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
+ Trustix Secure Linux 1.1
National Science Foundation Squid Web Proxy 2.4 STABLE4
- MandrakeSoft Corporate Server 1.0.1
- MandrakeSoft Single Network Firewall 7.2
- Mandriva Linux Mandrake 8.2
- Mandriva Linux Mandrake 8.1 ia64
- Mandriva Linux Mandrake 8.1
- Mandriva Linux Mandrake 8.0 ppc
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
National Science Foundation Squid Web Proxy 2.4 STABLE3
- Conectiva Linux 7.0
National Science Foundation Squid Web Proxy 2.4 STABLE2-3
- Caldera OpenLinux Server 3.1.1
- Caldera OpenLinux Workstation 3.1.1
National Science Foundation Squid Web Proxy 2.4 STABLE2-2
+ Caldera OpenLinux Server 3.1.1
- Caldera OpenLinux Workstation 3.1.1
National Science Foundation Squid Web Proxy 2.4 STABLE2
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenServer 5.0.6
- Conectiva Linux 7.0
National Science Foundation Squid Web Proxy 2.4 STABLE1
+ Conectiva Linux 8.0
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ HP Secure OS software for Linux 1.0
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ RedHat Linux 7.2
- S.u.S.E. Linux 7.2
National Science Foundation Squid Web Proxy 2.4 PRE-STABLE2
National Science Foundation Squid Web Proxy 2.4 PRE-STABLE
National Science Foundation Squid Web Proxy 2.4 DEVEL4
National Science Foundation Squid Web Proxy 2.4 DEVEL2
National Science Foundation Squid Web Proxy 2.4
+ FreeBSD FreeBSD 5.0
+ FreeBSD FreeBSD 4.5
+ FreeBSD FreeBSD 4.4
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
+ Trustix Secure Linux 1.1
National Science Foundation Squid Web Proxy 2.3.1
- Conectiva Linux 6.0
- Conectiva Linux 5.1
- Conectiva Linux 5.0
- Conectiva Linux graficas
- Conectiva Linux ecommerce
National Science Foundation Squid Web Proxy 2.3 STABLE5
+ MandrakeSoft Corporate Server 1.0.1
+ MandrakeSoft Single Network Firewall 7.2
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ Mandriva Linux Mandrake 7.2
+ Mandriva Linux Mandrake 7.1
+ Trustix Secure Linux 1.5
+ Trustix Secure Linux 1.2
+ Trustix Secure Linux 1.1
National Science Foundation Squid Web Proxy 2.3 STABLE4-11
+ Caldera OpenLinux Server 3.1
- Caldera OpenLinux Workstation 3.1
National Science Foundation Squid Web Proxy 2.3 STABLE4
- Caldera OpenLinux Server 3.1
- Immunix Immunix OS 7.0 beta
- Immunix Immunix OS 7.0
- Immunix Immunix OS 6.2
- MandrakeSoft Corporate Server 1.0.1
- MandrakeSoft Single Network Firewall 7.2
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
- S.u.S.E. Linux 7.3
- S.u.S.E. Linux 7.2
- S.u.S.E. Linux 7.1 x86
- S.u.S.E. Linux 7.1 sparc
- S.u.S.E. Linux 7.1 ppc
- S.u.S.E. Linux 7.1 alpha
- S.u.S.E. Linux 7.0 sparc
- S.u.S.E. Linux 7.0 ppc
- S.u.S.E. Linux 7.0 alpha
- S.u.S.E. Linux 7.0
- S.u.S.E. Linux 6.4 ppc
- S.u.S.E. Linux 6.4 alpha
- S.u.S.E. Linux 6.4
- Trustix Secure Linux 1.2
- Trustix Secure Linux 1.1
- Trustix Secure Linux 1.0 1
National Science Foundation Squid Web Proxy 2.3 STABLE3
- MandrakeSoft Corporate Server 1.0.1
- MandrakeSoft Single Network Firewall 7.2
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- RedHat Linux 7.0
- Trustix Secure Linux 1.2
- Trustix Secure Linux 1.1
- Trustix Secure Linux 1.0 1
National Science Foundation Squid Web Proxy 2.3 STABLE2
- MandrakeSoft Corporate Server 1.0.1
- MandrakeSoft Single Network Firewall 7.2
- Mandriva Linux Mandrake 8.0
- Mandriva Linux Mandrake 7.2
- Mandriva Linux Mandrake 7.1
- Trustix Secure Linux 1.2
- Trustix Secure Linux 1.1
- Trustix Secure Linux 1.0 1
National Science Foundation Squid Web Proxy 2.3
+ RedHat Linux 7.1 ia64
+ RedHat Linux 7.1 i386
+ RedHat Linux 7.1 alpha
+ RedHat Linux 7.0 i386
+ RedHat Linux 7.0 alpha
+ RedHat Linux 6.2 sparc
+ RedHat Linux 6.2 i386
+ RedHat Linux 6.2 alpha
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.1 x86
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
+ S.u.S.E. Linux 7.0 sparc
+ S.u.S.E. Linux 7.0 ppc
+ S.u.S.E. Linux 7.0 i386
+ S.u.S.E. Linux 7.0 alpha
+ S.u.S.E. Linux 6.4 ppc
+ S.u.S.E. Linux 6.4 i386
+ S.u.S.E. Linux 6.4 alpha
+ SCO Open Server 5.0.6 a
+ SCO Open Server 5.0.6
+ SCO Open Server 5.0.5
+ SCO Open Server 5.0.4
+ SCO Open Server 5.0.3
+ SCO Open Server 5.0.2
+ SCO Open Server 5.0.1
+ SCO Open Server 5.0
National Science Foundation Squid Web Proxy 2.2 STABLE5
- S.u.S.E. Linux 7.1 x86
- S.u.S.E. Linux 7.1 sparc
- S.u.S.E. Linux 7.1 ppc
- S.u.S.E. Linux 7.1 alpha
- S.u.S.E. Linux 7.0 sparc
- S.u.S.E. Linux 7.0 ppc
- S.u.S.E. Linux 7.0 alpha
- S.u.S.E. Linux 7.0
- S.u.S.E. Linux 6.4 ppc
- S.u.S.E. Linux 6.4 alpha
- S.u.S.E. Linux 6.3 alpha
- S.u.S.E. Linux 6.3
National Science Foundation Squid Web Proxy 2.2
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0 alpha
- RedHat Linux 6.0
- RedHat Linux 5.2 sparc
- RedHat Linux 5.2 i386
- RedHat Linux 5.2 alpha
National Science Foundation Squid Web Proxy 2.1
National Science Foundation Squid Web Proxy 2.0
National Science Foundation Squid Web Proxy 2.4 STABLE7

- 不受影响的程序版本

National Science Foundation Squid Web Proxy 2.4 STABLE7

- 漏洞讨论

Squid is a freely available, open source web proxy software package. It is designed for use on the Unix and Linux platforms.

Multiple vulnerabilities exist in the Squid gopher proxy that could lead to remote code execution. The parsing of gopher URLs by the Squid gopher proxy may result in buffer overflows, and potentially other issues that allow for the execution of code with the privileges of the Squid cache process.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

FreeBSD has released a Security Notice FreeBSD-SN-02:05. Users of FreeBSD systems are strongly urged to upgrade their ports tree to fix various reported issues. Further information can be found in the referenced Security Notice.

SCO has released advisory CSSA-2003-SCO.9 to address this issue.

Fixes available.


National Science Foundation Squid Web Proxy 2.2

National Science Foundation Squid Web Proxy 2.2 STABLE5

National Science Foundation Squid Web Proxy 2.3 STABLE3

National Science Foundation Squid Web Proxy 2.3 STABLE4

National Science Foundation Squid Web Proxy 2.3

National Science Foundation Squid Web Proxy 2.3 STABLE5

National Science Foundation Squid Web Proxy 2.3 STABLE2

National Science Foundation Squid Web Proxy 2.3 STABLE4-11

National Science Foundation Squid Web Proxy 2.3.1

National Science Foundation Squid Web Proxy 2.4 STABLE2-3

National Science Foundation Squid Web Proxy 2.4 STABLE4

National Science Foundation Squid Web Proxy 2.4 STABLE6

National Science Foundation Squid Web Proxy 2.4 STABLE2

National Science Foundation Squid Web Proxy 2.4 PRE-STABLE

National Science Foundation Squid Web Proxy 2.4 STABLE2-2

National Science Foundation Squid Web Proxy 2.4 STABLE3

National Science Foundation Squid Web Proxy 2.4 DEVEL4

National Science Foundation Squid Web Proxy 2.4 DEVEL2

National Science Foundation Squid Web Proxy 2.4

National Science Foundation Squid Web Proxy 2.4 PRE-STABLE2

National Science Foundation Squid Web Proxy 2.4 STABLE1

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站