CVE-2004-2479
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2013-07-18 00:37:43
NMCOS    

[原文]Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS operations to fail, which results in references to previously used error messages.


[CNNVD]Squid代理DNS查询失败随机错误消息的信息泄露漏洞(CNNVD-200412-1176)

        Squid Web Proxy Cache 2.5存在漏洞。远程攻击者借助包含导致DNS操作失败
        无效主机名的URLs获得敏感信息,该漏洞导致引用以前使用的错误信息。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable5
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable4
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable6
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable1
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable7
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable2
cpe:/a:national_science_foundation:squid_web_proxy_cache:2.5_stable3

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9711Squid Web Proxy Cache 2.5 might allow remote attackers to obtain sensitive information via URLs containing invalid hostnames that cause DNS ...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2479
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2479
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-1176
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/18406
(PATCH)  XF  squid-hostname-obtain-info(18406)
http://www.squid-cache.org/bugs/show_bug.cgi?id=1143
(PATCH)  CONFIRM  http://www.squid-cache.org/bugs/show_bug.cgi?id=1143
http://www.securityfocus.com/bid/11865
(PATCH)  BID  11865
http://securitytracker.com/id?1012466
(PATCH)  SECTRACK  1012466
http://secunia.com/advisories/13408
(VENDOR_ADVISORY)  SECUNIA  13408
http://www.osvdb.org/12282
(UNKNOWN)  OSVDB  12282
http://www.redhat.com/support/errata/RHSA-2005-766.html
(UNKNOWN)  REDHAT  RHSA-2005:766
http://secunia.com/advisories/16977
(UNKNOWN)  SECUNIA  16977
http://fedoranews.org/updates/FEDORA--.shtml
(UNKNOWN)  FEDORA  FLSA-2006:152809

- 漏洞信息

Squid代理DNS查询失败随机错误消息的信息泄露漏洞
中危 设计错误
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        Squid Web Proxy Cache 2.5存在漏洞。远程攻击者借助包含导致DNS操作失败
        无效主机名的URLs获得敏感信息,该漏洞导致引用以前使用的错误信息。

- 公告与补丁

        Please see the referenced vendor advisories for more information and fixes.
        
        Squid Web Proxy Cache 2.5 .STABLE6
        
        Squid Web Proxy Cache 2.5 .STABLE4
        
        Squid Web Proxy Cache 2.5 .STABLE1
        
        Squid Web Proxy Cache 2.5 .STABLE3
        
        Squid Web Proxy Cache 2.5 .STABLE7
        
        Squid Web Proxy Cache 2.5 .STABLE5
        

- 漏洞信息

12282
Squid Malformed Host Name Error Message Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

Squid contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a sequence of failed DNS lookups causes contents of recently freed memory to be displayed as error messages, which will disclose random information resulting in a loss of confidentiality.

- 时间线

2004-11-23 Unknow
2004-11-23 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Team Squid has released a source code patch to address this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

Squid Proxy Failed DNS Lookup Random Error Messages Information Disclosure Vulnerability
Design Error 11865
Yes No
2004-11-23 12:00:00 2006-12-20 09:47:00
Discovery is credited to Artur Szostak <artur@alice.phy.uct.ac.za>.

- 受影响的程序版本

Squid Web Proxy Cache 2.5 .STABLE7
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ Gentoo Linux
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
Squid Web Proxy Cache 2.5 .STABLE6
+ Mandriva Linux Mandrake 10.1 x86_64
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Turbolinux Server 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Squid Web Proxy Cache 2.5 .STABLE5
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Squid Web Proxy Cache 2.5 .STABLE4
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ OpenPKG OpenPKG 2.0
+ OpenPKG OpenPKG Current
Squid Web Proxy Cache 2.5 .STABLE3
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ OpenPKG OpenPKG 1.3
+ Red Hat Enterprise Linux AS 3
+ Red Hat Fedora Core1
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
Squid Web Proxy Cache 2.5 .STABLE1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ S.u.S.E. Linux Personal 8.2
SGI ProPack 3.0 SP6
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1

- 漏洞讨论

Squid Proxy is reported prone to an information-disclosure vulnerability. This issue may allow an attacker to gain access to potentially sensitive information.

An attacker can trigger this condition by supplying malformed host names to the proxy. The attacker may use information gathered through exploiting this condition to carry out further attacks against the application or other users.

This vulnerability is reported to affect Squid 2.5, but other versions may be affected as well.

- 漏洞利用

An exploit is not required.

- 解决方案

Please see the referenced vendor advisories for more information and fixes.


Squid Web Proxy Cache 2.5 .STABLE6

Squid Web Proxy Cache 2.5 .STABLE4

Squid Web Proxy Cache 2.5 .STABLE1

Squid Web Proxy Cache 2.5 .STABLE3

Squid Web Proxy Cache 2.5 .STABLE7

Squid Web Proxy Cache 2.5 .STABLE5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站