CVE-2005-1519
CVSS6.4
发布时间 :2005-05-11 00:00:00
修订时间 :2011-03-07 21:22:08
NMCOPS    

[原文]Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attackers to spoof DNS lookups.


[CNNVD]Squid代理未明DNS欺骗漏洞(CNNVD-200505-940)

        Squid 2.5 STABLE9及更早版本,当DNS客户端端口未经过滤并且环境未防止IP欺骗时,远程攻击者可以进行DNS解析欺骗。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9976Squid 2.5 STABLE9 and earlier, when the DNS client port is unfiltered and the environment does not prevent IP spoofing, allows remote attack...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1519
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1519
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-940
(官方数据源) CNNVD

- 其它链接及资源

http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query
(PATCH)  CONFIRM  http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query
http://secunia.com/advisories/15294
(PATCH)  SECUNIA  15294
http://www.vupen.com/english/advisories/2005/0521
(UNKNOWN)  VUPEN  ADV-2005-0521
http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html
(UNKNOWN)  FEDORA  FEDORA-2005-373
http://www.securityfocus.com/bid/13592
(UNKNOWN)  BID  13592
http://www.redhat.com/support/errata/RHSA-2005-489.html
(UNKNOWN)  REDHAT  RHSA-2005:489
http://www.debian.org/security/2005/dsa-751
(UNKNOWN)  DEBIAN  DSA-751
http://fedoranews.org/updates/FEDORA--.shtml
(UNKNOWN)  FEDORA  FLSA-2006:152809

- 漏洞信息

Squid代理未明DNS欺骗漏洞
中危 资料不足
2005-05-11 00:00:00 2005-10-20 00:00:00
远程  
        Squid 2.5 STABLE9及更早版本,当DNS客户端端口未经过滤并且环境未防止IP欺骗时,远程攻击者可以进行DNS解析欺骗。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        Trustix Secure Linux 1.5
        Trustix kernel-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-BOOT-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-doc-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-headers-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-smp-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-source-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-utils-2.2.26-2tr.i586.rpm
        TSL 1.5
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix Secure Linux 2.2
        Trustix kernel-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-BOOT-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-doc-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-smp-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-source-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix kernel-utils-2.4.30-4tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Trustix squid-2.5.STABLE9-6tr.i586.rpm
        TSL 2.2
        ftp://ftp.trustix.org/pub/trustix/updates
        Squid Web Proxy Cache 2.3 .STABLE4
        Turbolinux squid-2.5.STABLE10-3.i586.rpm
        Turbolinux 7 Workstation:
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 7/updates/RPMS/squid-2.5.STABLE10-3.i586.rpm
        Squid Web Proxy Cache 2.4 .STABLE6
        RedHat squid-2.4.STABLE7-0.73.3.legacy.i386.rpm
        Red Hat Linux 7.3:
        http://download.fedoralegacy.org/redhat/7.3/updates/i386/squid-2.4.STA BLE7-0.73.3.legacy.i386.rpm
        Turbolinux squid-2.5.STABLE10-3.i586.rpm
        Turbolinux 8 Server:
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/upd ates/RPMS/squid-2.5.STABLE10-3.i586.rpm
        Turbolinux squid-2.5.STABLE10-3.i586.rpm
        Turbolinux 8 Workstation:
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Workstation/ 8/updates/RPMS/squid-2.5.STABLE10-3.i586.rpm
        Squid Web Proxy Cache 2.4 .STABLE2
        Turbolinux squid-2.5.STABLE10-3.i586.rpm
        Turbolinux 7 Server:
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/upd ates/RPMS/squid-2.5.STABLE10-3.i586.rpm
        Squid Web Proxy Cache 2.5 .STABLE6
        Fedora squid-2.5.STABLE9-1.FC3.6.i386.rpm
        RedHat Fedora Core 3
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
        Fedora squid-2.5.STABLE9-1.FC3.6.x86_64.rpm
        RedHat Fedora Core 3
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
        Fedora squid-debuginfo-2.5.STABLE9-1.FC3.6.i386.rpm
        RedHat Fedora Core 3
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
        Fedora squid-debuginfo-2.5.STABLE9-1.FC3.6.x86_64.rpm
        RedHat Fedora Core 3
        http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
        Turbolinux squid-2.5.STABLE10-3.i586.rpm
        Turbolinux 10 Server
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/up dates/RPMS/squid-2.5.STABLE10-3.i586.rpm
        Turbolinux squid-debug-2.5.STABLE10-3.i586.rpm
        Turbolinux 10 Server:
        ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/10/up dates/RPMS/squid-debug-2.5.STABLE10-3.i586.rpm
        Ubuntu squid-cgi_2.5.5-6ubuntu0.9_amd64.deb
        Ubuntu 4.10 (Warty Warthog)
        http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5. 5-6ubuntu0.9_amd64.deb
        Ubuntu squid-cgi_2.5.5-6ubuntu0.9_i386.deb
        Ubuntu 4.10 (Warty Warthog)
        http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5. 5-6ubuntu0.9_i386.deb
        Ubuntu squid-cgi_2.5.5-6ubuntu0.9_powerpc.deb
        Ubuntu 4.10 (Warty Warthog)
        http://security.ubuntu.com/ubuntu/pool/universe/s/squid/squid-cgi_2.5. 5-6ubuntu0.9_powerpc.deb
        Ubuntu squid-common_2.5.5-6ubuntu0.9_all.deb
        Ubuntu 4.10 (Warty Warthog)
        http://security.ubuntu.com/ubuntu/pool/main/s/squid/squid-common_2.5.5 -6ubuntu0.9_all.deb
        Ubuntu squid_2.5.5-6ubuntu0.9_amd64.deb
        Ubuntu 4.10 (Warty Warthog)
        http://sec

- 漏洞信息 (F38602)

Debian Linux Security Advisory 751-1 (PacketStormID:F38602)
2005-07-12 00:00:00
Debian  security.debian.org
advisory,web,arbitrary,udp,spoof
linux,debian
CVE-2005-1519
[点击下载]

Debian Security Advisory DSA 751-1 - The upstream developers have discovered a bug in the DNS lookup code of Squid, the popular WWW proxy cache. When the DNS client UDP port (assigned by the operating system at startup) is unfiltered and the network is not protected from IP spoofing, malicious users can spoof DNS lookups which could result in users being redirected to arbitrary web sites.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 751-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
July 11th, 2005                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : squid
Vulnerability  : IP spoofing
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-1519
Debian Bug     : 309504

The upstream developers have discovered a bug in the DNS lookup code
of Squid, the popular WWW proxy cache.  When the DNS client UDP port
(assigned by the operating system at startup) is unfiltered and the
network is not protected from IP spoofing, malicious users can spoof
DNS lookups which could result in users being redirected to arbitrary
web sites.

For the old stable distribution (woody) this problem has been fixed in
version 2.4.6-2woody9.

For the stable distribution (sarge) this problem has already been
fixed in version squid-2.5.9-9.

For the unstable distribution (sid) this problem has already been
fixed in version squid-2.5.9-9.

We recommend that you upgrade your squid package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9.dsc
      Size/MD5 checksum:      612 3fa0175264bf3047e24cdfedb998a562
    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9.diff.gz
      Size/MD5 checksum:   251983 8f9ff155f1aa9e6dd4eb7cedd1bd3d72
    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6.orig.tar.gz
      Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228

  Alpha architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_alpha.deb
      Size/MD5 checksum:   816730 5f3be8d3c78aa606ad7c74470d144b8f
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_alpha.deb
      Size/MD5 checksum:    75804 583772834d2039e981a3133a8b93fc84
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_alpha.deb
      Size/MD5 checksum:    60560 5aae3b527887250e15c4e320dc07b59e

  ARM architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_arm.deb
      Size/MD5 checksum:   726818 a12c09415f9296b0294a72da513da540
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_arm.deb
      Size/MD5 checksum:    73588 c257ec52c12616cbab2245d480ae182e
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_arm.deb
      Size/MD5 checksum:    58898 0cb67566734d8726bc9f7d7f1e3fd282

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_i386.deb
      Size/MD5 checksum:   685864 4df5913de4867724e1ea0f8b787a6d59
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_i386.deb
      Size/MD5 checksum:    73314 57f70ab976fa90fdc39b744502eae489
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_i386.deb
      Size/MD5 checksum:    58484 5ebcce4092143854b38a7d3db1de390d

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_ia64.deb
      Size/MD5 checksum:   954776 ed63a873903c829292ae5cf4cc8e918b
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_ia64.deb
      Size/MD5 checksum:    79640 23c6697f0c86bda9d67e694fd4ab4804
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_ia64.deb
      Size/MD5 checksum:    63236 007bf8916f2eaac7b4808a48035c49f0

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_hppa.deb
      Size/MD5 checksum:   780136 66f816b103f22db0da3bc9b239240ee4
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_hppa.deb
      Size/MD5 checksum:    75026 47bc59533a41ecbcc62990d15b5cb59c
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_hppa.deb
      Size/MD5 checksum:    60044 e2e1d5a45ebde9b4e34c9257976de433

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_m68k.deb
      Size/MD5 checksum:   667204 e92038eef385524a8fbcd9c2ffa0204b
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_m68k.deb
      Size/MD5 checksum:    72938 2d4f77cdbb6c0c2018171edd31b6b3d3
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_m68k.deb
      Size/MD5 checksum:    58142 7467c67935c89a73fdcffeef2a93d604

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_mips.deb
      Size/MD5 checksum:   766022 988b4b95bf2d61913fd17104372e1ce9
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_mips.deb
      Size/MD5 checksum:    74534 5e0c60406c3b13acb984bf42a2366fda
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_mips.deb
      Size/MD5 checksum:    59186 d368ea558629d434bb15b4325ff55b77

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_mipsel.deb
      Size/MD5 checksum:   766462 d1591d9142a2496bb84c7045ad1c8871
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_mipsel.deb
      Size/MD5 checksum:    74614 6fd8434ffa976cca49ac825758e841aa
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_mipsel.deb
      Size/MD5 checksum:    59298 d8f858a9ddac2fb793dbc44501b7f448

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_powerpc.deb
      Size/MD5 checksum:   723618 d65ddc3343eb1e3db573fd2608952f53
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_powerpc.deb
      Size/MD5 checksum:    73576 be7b21a20cee04b344467b0fc5d0f6e0
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_powerpc.deb
      Size/MD5 checksum:    58790 884fd1a33da05e5ae411b891ae1e35d8

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_s390.deb
      Size/MD5 checksum:   712898 cb4bfc96d86fa232c442ceeaebf0771d
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_s390.deb
      Size/MD5 checksum:    73912 895192f5f60927d449d6178f19d4674a
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_s390.deb
      Size/MD5 checksum:    59342 0ef0505c7586d62265a4211571c10f8b

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_sparc.deb
      Size/MD5 checksum:   725260 ef81727ef3614993f8bb49c463e159d1
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_sparc.deb
      Size/MD5 checksum:    76210 a4f3fb847e2ae897c678c1a7e1d87fa8
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_sparc.deb
      Size/MD5 checksum:    61226 4e4457bcc2272b2d226ac65d07f3ad36


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC0or5W5ql+IAeqTIRAiO+AJ96wrWVHZzDvispoJZtNns0aGkCbgCcDbbH
7Qxnk9XWFSoWg8WtTplNohs=
=4y6q
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息

16335
Squid DNS Lookup Spoofing
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Squid Proxy contains a flaw that may allow a malicious user to spoof DNS lookups. The issue is triggered when an unspecified error occur in the DNS client while handling DNS responses. It is possible that the flaw may allow a malicious user to spoof DNS lookups resulting in a loss of integrity.

- 时间线

2005-05-11 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Squid has released a patch for version 2.5.STABLE9 to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Squid Proxy Unspecified DNS Spoofing Vulnerability
Unknown 13592
Yes No
2005-05-11 12:00:00 2007-03-07 05:25:00
Reported by the vendor.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
Trustix Secure Linux 2.2
Trustix Secure Linux 1.5
Trustix Secure Enterprise Linux 2.0
Squid Web Proxy Cache 2.5 .STABLE9
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.2 x86_64
+ Mandriva Linux Mandrake 10.2
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
Squid Web Proxy Cache 2.5 .STABLE8
+ Gentoo Linux
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Squid Web Proxy Cache 2.5 .STABLE7
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ Gentoo Linux
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
Squid Web Proxy Cache 2.5 .STABLE6
+ Mandriva Linux Mandrake 10.1 x86_64
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Turbolinux Server 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Squid Web Proxy Cache 2.5 .STABLE5
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Squid Web Proxy Cache 2.5 .STABLE4
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ OpenPKG OpenPKG 2.0
+ OpenPKG OpenPKG Current
Squid Web Proxy Cache 2.5 .STABLE3
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ OpenPKG OpenPKG 1.3
+ Red Hat Enterprise Linux AS 3
+ Red Hat Fedora Core1
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
Squid Web Proxy Cache 2.5 .STABLE1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ S.u.S.E. Linux Personal 8.2
Squid Web Proxy Cache 2.4 .STABLE7
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux Advanced Work Station 2.1
Squid Web Proxy Cache 2.4 .STABLE6
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Squid Web Proxy Cache 2.4 .STABLE2
Squid Web Proxy Cache 2.4
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Squid Web Proxy Cache 2.3 .STABLE5
Squid Web Proxy Cache 2.3 .STABLE4
Squid Web Proxy Cache 2.1 PATCH2
Squid Web Proxy Cache 2.0 PATCH2
SGI ProPack 3.0 SP5
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3

- 漏洞讨论

Squid Proxy is prone to an unspecified DNS-spoofing vulnerability. This could allow malicious users to perform DNS-spoofing attacks on Squid Proxy clients on unprotected networks.

This issue affects Squid Proxy versions 2.5 and earlier.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Please see the referenced vendor advisories for more information and fixes.


Trustix Secure Linux 1.5

Trustix Secure Linux 2.2

Squid Web Proxy Cache 2.3 .STABLE4

Squid Web Proxy Cache 2.4 .STABLE6

Squid Web Proxy Cache 2.4 .STABLE2

Squid Web Proxy Cache 2.5 .STABLE6

Squid Web Proxy Cache 2.5 .STABLE1

Squid Web Proxy Cache 2.5 .STABLE3

Squid Web Proxy Cache 2.5 .STABLE5

Squid Web Proxy Cache 2.5 .STABLE9

Squid Web Proxy Cache 2.5 .STABLE8

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站