CVE-2005-2794
CVSS5.0
发布时间 :2005-09-07 14:03:00
修订时间 :2010-08-21 00:32:09
NMCOPS    

[原文]store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING.


[CNNVD]Squid Proxy store.c远程拒绝服务漏洞(CNNVD-200509-046)

        Squid是一个高效的Web缓存及代理程序,最初是为Unix平台开发的,现在也被移植到Linux和大多数的Unix类系统中。最新的Squid可以运行在Windows平台下。
        Squid 2.5.STABLE10及更早版本的store.c允许远程攻击者发送可以触发有关STORE_PENDING断言错误的终止请求,导致sslConnectTimeout函数中出现分段错误,造成Squid崩溃。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:squid:squid:2.1.patch2
cpe:/a:squid:squid:2.2.stable5
cpe:/a:squid:squid:2.1.release
cpe:/a:squid:squid:2.3.stable3
cpe:/a:squid:squid:2.5.stable9
cpe:/a:squid:squid:2.5.stable4
cpe:/a:squid:squid:2.2.stable1
cpe:/a:squid:squid:2.4.stable2
cpe:/a:squid:squid:2.3.stable2
cpe:/a:squid:squid:2.2.stable2
cpe:/a:squid:squid:2.5.stable10
cpe:/a:squid:squid:2.4.stable4
cpe:/a:squid:squid:2.2.pre2
cpe:/a:squid:squid:2.4.stable7
cpe:/a:squid:squid:2.3.stable4
cpe:/a:squid:squid:2.3.devel3
cpe:/a:squid:squid:2.1.pre4
cpe:/a:squid:squid:2.5.stable6
cpe:/a:squid:squid:2.0.patch2
cpe:/a:squid:squid:2.5.stable8
cpe:/a:squid:squid:2.5.stable7
cpe:/a:squid:squid:2.2.devel4
cpe:/a:squid:squid:2.0.release
cpe:/a:squid:squid:2.2.stable4
cpe:/a:squid:squid:2.4.stable3
cpe:/a:squid:squid:2.5.stable5
cpe:/a:squid:squid:2.5.stable2
cpe:/a:squid:squid:2.1.pre3
cpe:/a:squid:squid:2.5.stable3
cpe:/a:squid:squid:2.0.patch1
cpe:/a:squid:squid:2.1.patch1
cpe:/a:squid:squid:2.2.stable3
cpe:/a:squid:squid:2.2.pre1
cpe:/a:squid:squid:2.4.stable6
cpe:/a:squid:squid:2.3.stable5
cpe:/a:squid:squid:2.0.pre1
cpe:/a:squid:squid:2.1.pre1
cpe:/a:squid:squid:2.2.devel3
cpe:/a:squid:squid:2.5.stable1
cpe:/a:squid:squid:2.3.devel2
cpe:/a:squid:squid:2.4.stable1
cpe:/a:squid:squid:2.3.stable1

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10276store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that tri...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2794
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2794
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200509-046
(官方数据源) CNNVD

- 其它链接及资源

http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING
(UNKNOWN)  CONFIRM  http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING
http://www.securityfocus.com/bid/14761
(UNKNOWN)  BID  14761
http://www.redhat.com/support/errata/RHSA-2005-766.html
(UNKNOWN)  REDHAT  RHSA-2005:766
http://www.novell.com/linux/security/advisories/2005_53_squid.html
(UNKNOWN)  SUSE  SUSE-SA:2005:053
http://www.novell.com/linux/security/advisories/2005_21_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2005:021
http://www.mandriva.com/security/advisories?name=MDKSA-2005:162
(UNKNOWN)  MANDRIVA  MDKSA-2005:162
http://www.gentoo.org/security/en/glsa/glsa-200509-06.xml
(UNKNOWN)  GENTOO  GLSA-200509-06
http://www.debian.org/security/2005/dsa-809
(UNKNOWN)  DEBIAN  DSA-809
http://secunia.com/advisories/17027
(UNKNOWN)  SECUNIA  17027
http://secunia.com/advisories/16977
(UNKNOWN)  SECUNIA  16977
http://fedoranews.org/updates/FEDORA--.shtml
(UNKNOWN)  FEDORA  FLSA-2006:152809

- 漏洞信息

Squid Proxy store.c远程拒绝服务漏洞
中危 其他
2005-09-07 00:00:00 2005-10-20 00:00:00
远程  
        Squid是一个高效的Web缓存及代理程序,最初是为Unix平台开发的,现在也被移植到Linux和大多数的Unix类系统中。最新的Squid可以运行在Windows平台下。
        Squid 2.5.STABLE10及更早版本的store.c允许远程攻击者发送可以触发有关STORE_PENDING断言错误的终止请求,导致sslConnectTimeout函数中出现分段错误,造成Squid崩溃。

- 公告与补丁

        暂无数据

- 漏洞信息 (F41214)

SCOSA-2005.44.txt (PacketStormID:F41214)
2005-11-03 00:00:00
SCO  sco.com
advisory,remote,denial of service
CVE-2005-2794,CVE-2005-2796,CVE-2005-2917,CVE-2005-3258
[点击下载]

SCO Security Advisory - store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING. The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests. Squid versions 2.5.STABLE10 and below, while performing NTLM authentication, do not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


______________________________________________________________________________

 			SCO Security Advisory

Subject:		UnixWare 7.1.4 : Squid Denial of Service
Advisory number: 	SCOSA-2005.44
Issue date: 		2005 November 01
Cross reference:	fz533116 fz533151 fz533254
 			CAN-2005-2794 CAN-2005-2796 CVE-2005-2917 CVE-2005-3258
______________________________________________________________________________


1. Problem Description

 	store.c in Squid 2.5.STABLE10 and earlier allows remote
 	attackers to cause a denial of service (crash) via certain
 	aborted requests that trigger an assert error related to
 	STORE_PENDING.

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CAN-2005-2794 to this issue.

 	The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10
 	and earlier allows remote attackers to cause a denial of service
 	(segmentation fault) via certain crafted requests.

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CAN-2005-2796 to this issue.

 	Squid 2.5.STABLE10 and earlier, while performing NTLM
 	authentication, does not properly handle certain request
 	sequences, which allows attackers to cause a denial of service
 	(daemon restart).

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CVE-2005-2917 to this issue

 	The rfc1738_do_escape function in ftp.c for Squid 2.5 STABLE11
 	and earlier allows remote FTP servers to cause a denial of
 	service (segmentation fault) via certain "odd" responses.

 	The Common Vulnerabilities and Exposures project (cve.mitre.org)
 	has assigned the name CVE-2005-3258 to this issue.


2. Vulnerable Supported Versions

 	System				Binaries
 	----------------------------------------------------------------------
 	UnixWare 7.1.4 			squid 2.5.STABLE12 distribution


3. Solution

 	The proper solution is to install the latest packages.


4. UnixWare 7.1.4

 	4.1 Location of Fixed Binaries

 	ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.44


 	4.2 Verification

 	32fd0223233496f737e85a9aa31f00a4  squid-2.5.STABLE12.image

 	md5 is available for download from
 		ftp://ftp.sco.com/pub/security/tools


 	4.3 Installing Fixed Binaries

 	Upgrade the affected binaries with the following sequence:

 	Download squid-2.5.STABLE12.image to the /var/spool/pkg directory

 	# pkgadd -d /var/spool/pkg/squid-2.5.STABLE12.image


5. References

 	Specific references for this advisory:
 		http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-STORE_PENDING
 		http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE10-sslConnectTimeout
 		http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE11-rfc1738_do_escape
 		http://securitytracker.com/id?1014846
 		http://secunia.com/advisories/16992
 		http://secunia.com/advisories/17271
 		http://www.frsirt.com/english/advisories/2005/2151

 	SCO security resources:
 		http://www.sco.com/support/security/index.html

 	SCO security advisories via email
 		http://www.sco.com/support/forums/security.html

 	This security fix closes SCO incidents fz533116 fz533151
 	fz533254.


6. Disclaimer

 	SCO is not responsible for the misuse of any of the information
 	we provide on this website and/or through our security
 	advisories. Our advisories are a service to our customers
 	intended to promote secure installation and use of SCO
 	products.


______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (UnixWare)

iD8DBQFDaO04aqoBO7ipriERAskPAKCezWSWi/+glMAT2NvdDRyEfjrTywCfTA55
uYqqvxwQCux9I7+3y8RADIY=
=tG9W
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F40356)

Debian Linux Security Advisory 809-2 (PacketStormID:F40356)
2005-10-04 00:00:00
Debian  security.debian.org
advisory,remote,denial of service
linux,debian
CVE-2005-2794
[点击下载]

Debian Security Advisory DSA 809-2 - Certain aborted requests that trigger an assertion in squid, the popular WWW proxy cache, may allow remote attackers to cause a denial of service. This update also fixes a regression caused by DSA 751.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 809-2                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
September 30th, 2005                    http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : squid
Vulnerability  : assertion error
Problem type   : remote
Debian-specific: no
CVE ID         : CAN-2005-2794
Debian Bug     : 320035

Certain aborted requests that trigger an assertion in squid, the
popular WWW proxy cache, may allow remote attackers to cause a denial
of service.  This update also fixes a regression caused by DSA 751.

For the oldstable distribution (woody) this problem has been fixed in
version 2.4.6-2woody10.

For the stable distribution (sarge) this problem has been fixed in
version 2.5.9-10sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.5.10-5.

We recommend that you upgrade your squid package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10.dsc
      Size/MD5 checksum:      614 72838788cad08e14db248125795fef03
    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10.diff.gz
      Size/MD5 checksum:   257792 036373fa29b3f0ef0f13f1ce2b7e9506
    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6.orig.tar.gz
      Size/MD5 checksum:  1081920 59ce2c58da189626d77e27b9702ca228

  Alpha architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_alpha.deb
      Size/MD5 checksum:   817042 b0318ebf7e5450af40b441af0c50b229
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_alpha.deb
      Size/MD5 checksum:    75990 a0b663697addfd7ddbb88720c0b9e68e
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_alpha.deb
      Size/MD5 checksum:    60788 65e29fc78534c678777e894cd26eec7f

  ARM architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_arm.deb
      Size/MD5 checksum:   727164 d19d26c7184a23612fdc6bdb005e11b9
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_arm.deb
      Size/MD5 checksum:    73770 4fa3a5c95b1afa8842b8a340ec702860
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_arm.deb
      Size/MD5 checksum:    59082 2e1de11f65b713e3db221e1ea8bbef34

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_i386.deb
      Size/MD5 checksum:   685324 d228802c15397d498ca395a79b6d56bc
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_i386.deb
      Size/MD5 checksum:    74282 fd8888249ca4080be1ba62e9cdd5b3ba
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_i386.deb
      Size/MD5 checksum:    58774 8ba44f4a2da57814f0813d21e23b5f95

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_ia64.deb
      Size/MD5 checksum:   954974 feeefd11d6f446fbf70cc5954b9273df
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_ia64.deb
      Size/MD5 checksum:    79824 ca19bb8416b7648195cc7b1c9768ceab
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_ia64.deb
      Size/MD5 checksum:    63464 d9b3f5e4b4e690dee6bff6a720112d08

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_hppa.deb
      Size/MD5 checksum:   780254 31bcfe48aa1774e2f29a9fc3fcb028f0
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_hppa.deb
      Size/MD5 checksum:    75208 ab2f18b11bea0362cf27cab265324e10
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_hppa.deb
      Size/MD5 checksum:    60236 c11448e476cc4aecc2f8fbd8f35873aa

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_m68k.deb
      Size/MD5 checksum:   667886 9c1c6c63caca8e2ba13723060cb0038a
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_m68k.deb
      Size/MD5 checksum:    73110 5c5bb1288209366cc195afb92ada5c88
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_m68k.deb
      Size/MD5 checksum:    58332 8dd16ceb8fca5fbc29e2e051d21a1c02

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_mips.deb
      Size/MD5 checksum:   766336 aa28ffd592af2bf9fd57aae55e4c4c42
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_mips.deb
      Size/MD5 checksum:    74746 c037664fd063e6b938131b67290471ee
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_mips.deb
      Size/MD5 checksum:    59382 dc652da2e206ca66180c2b8038a2d531

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_mipsel.deb
      Size/MD5 checksum:   766916 842c270e8d8aac9c8cafd710e7a80056
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_mipsel.deb
      Size/MD5 checksum:    74798 883335e9cbc0bab9dcf6f8d341ef65f4
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_mipsel.deb
      Size/MD5 checksum:    59462 462a5a45363182d594099aa0c8fd9aed

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_powerpc.deb
      Size/MD5 checksum:   724132 156c01c65ee7cf2fed18fee9efb9a041
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_powerpc.deb
      Size/MD5 checksum:    73768 5b595aa01f81366cd5a8c2a0c2e910eb
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_powerpc.deb
      Size/MD5 checksum:    58980 b15773fde173ecf67c0491a29b4db6d6

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_s390.deb
      Size/MD5 checksum:   713198 8e578e68b934256633d79da244add1af
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_s390.deb
      Size/MD5 checksum:    74096 ff166996af8bc0443447014a6b614648
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_s390.deb
      Size/MD5 checksum:    59528 8bb8826cfdb59c54ffa7e14b19840795

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody10_sparc.deb
      Size/MD5 checksum:   725476 7653876e85019972267725ec16038326
    http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody10_sparc.deb
      Size/MD5 checksum:    76372 64ae6d6fe2317785a8d537bb4664106e
    http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody10_sparc.deb
      Size/MD5 checksum:    61404 33d487f77d9912900e14c033b4a3a306


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDPNJ4W5ql+IAeqTIRAprcAJoC8BdcgnTVh22GF7zPlIQpm07FJwCfUd20
S7ucdnDlPIXPtAKVAesq3Io=
=DEf1
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
    

- 漏洞信息 (F40112)

SUSE-SA-2005-053.txt (PacketStormID:F40112)
2005-09-20 00:00:00
 
advisory,web,denial of service,vulnerability
linux,suse
CVE-2005-2794,CVE-2005-2796
[点击下载]

SUSE Security Announcement - Squid web-proxy suffers from two remotely exploitable denial of service vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----

______________________________________________________________________________

                        SUSE Security Announcement

        Package:                squid
        Announcement ID:        SUSE-SA:2005:053
        Date:                   Fri, 16 Sep 2005 14:28:00 +0000
        Affected Products:      9.0, 9.1, 9.2, 9.3
                                SUSE Linux Enterprise Server 8, 9
                                Open Enterprise Server 9
        Vulnerability Type:     remote denial of service
        Severity (1-10):        4
        SUSE Default Package:   no
        Cross-References:       CAN-2005-2794
                                CAN-2005-2796

    Content of This Advisory:
        1) Security Vulnerability Resolved:
             - remote denial of service
           Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Package Location and Checksums
        5) Pending Vulnerabilities, Solutions, and Workarounds:
            none
        6) Authenticity Verification and Additional Information

______________________________________________________________________________

1) Problem Description and Brief Discussion

   This update of the Squid web-proxy fixes two remotely exploitable denial
   of service vulnerabilities.

   One can be triggered by aborting a request (CAN-2005-2794) due to a faulty
   assertion.

   The other one occurs in sslConnectTimeout while handling malformated
   requests (CAN-2005-2796).

   The latter one does not affect SUSE LINUX 9.3.

2) Solution or Workaround

   There are no workarounds known.

3) Special Instructions and Notes

   Please restart the Squid web-proxy after the update.

4) Package Location and Checksums

   The preferred method for installing security updates is to use the YaST
   Online Update (YOU) tool. YOU detects which updates are required and
   automatically performs the necessary steps to verify and install them.
   Alternatively, download the update packages for your distribution manually
   and verify their integrity by the methods listed in Section 6 of this
   announcement. Then install the packages using the command

     rpm -Fhv <file.rpm>

   to apply the update, replacing <file.rpm> with the filename of the
   downloaded RPM package.

   Our maintenance customers are notified individually. The packages are
   offered for installation from the maintenance web.

   x86 Platform:

   SUSE Linux 9.3:
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/squid-2.5.STABLE9-4.4.i586.rpm
     eea572b10ecf573753af16ecf1fbdaa7
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/squid-2.5.STABLE9-4.4.i586.patch.rpm
     becf331a849332d734d72f90801d8338
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/squid-2.5.STABLE9-4.4.src.rpm
     8c0ffeccd0c8fd64418164f275adbd27

   SUSE Linux 9.2:
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/squid-2.5.STABLE6-6.15.i586.rpm
     93720922d4f7ae4370b2c4e493fae592
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/squid-2.5.STABLE6-6.15.i586.patch.rpm
     9e4d07f1f11c8c1cbf7564c8d2164ca7
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/squid-2.5.STABLE6-6.15.src.rpm
     236cb11582b4983350ef81e5e8508c39

   SUSE Linux 9.1:
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/squid-2.5.STABLE5-42.41.i586.rpm
     dc9848a817367dfe278a6f3954c6677f
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/squid-2.5.STABLE5-42.41.i586.patch.rpm
     5c534d9df125a3ff02c5fa32bf216f64
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/squid-2.5.STABLE5-42.41.src.rpm
     4dd683495e578ec59bd34260caf9a565

   SUSE Linux 9.0:
   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/squid-2.5.STABLE3-126.i586.rpm
     6d094da21806166dde5f6da8307ca2a2
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/squid-2.5.STABLE3-126.i586.patch.rpm
     02172274b15a28b918c54d470203d029
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/squid-2.5.STABLE3-126.src.rpm
     3cfae65a6cee24e6cfe8adc4226fa601



   x86-64 Platform:

   SUSE Linux 9.3:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/squid-2.5.STABLE9-4.4.x86_64.rpm
     d07ae04a018a3abb082cd0b130c145a0
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/x86_64/squid-2.5.STABLE9-4.4.x86_64.patch.rpm
     cbcb39ccc9ee0340692ae3cf048453ff
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.3/rpm/src/squid-2.5.STABLE9-4.4.src.rpm
     8c0ffeccd0c8fd64418164f275adbd27

   SUSE Linux 9.2:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/squid-2.5.STABLE6-6.15.x86_64.rpm
     915b0b2955f878a2e89b171d1335274c
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/x86_64/squid-2.5.STABLE6-6.15.x86_64.patch.rpm
     c488ab4031de911b6675a785a4d2a4dd
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.2/rpm/src/squid-2.5.STABLE6-6.15.src.rpm
     236cb11582b4983350ef81e5e8508c39

   SUSE Linux 9.1:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/squid-2.5.STABLE5-42.41.x86_64.rpm
     6fc9746898681ee217f884f6aaca8e68
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/squid-2.5.STABLE5-42.41.x86_64.patch.rpm
     37ada616c159242b53e2dfbf5f94597c
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/squid-2.5.STABLE5-42.41.src.rpm
     310321fd1232ea45ccb06fd5b24ba664

   SUSE Linux 9.0:
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/squid-2.5.STABLE3-126.x86_64.rpm
     f39071c7802d8bb77ed00038e095a6af
   patch rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/squid-2.5.STABLE3-126.x86_64.patch.rpm
     05f996332331ddebf848cc2726fcbc87
   source rpm(s):
   ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/squid-2.5.STABLE3-126.src.rpm
     3c7e8fc9a5e0cf4c6638d57fed2fdf53

______________________________________________________________________________

5) Pending Vulnerabilities, Solutions, and Workarounds:

   See SUSE Security Summary Report.
______________________________________________________________________________

6) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web
    sites. The authenticity and integrity of a SUSE security announcement is
    guaranteed by a cryptographic signature in each announcement. All SUSE
    security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file
    and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement. The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 3D25D3D9
      gpg: Good signature from "SuSE Security Team <security@suse.de>"

    where <DATE> is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can
    import it from the first installation CD. To import the key, use the
    command

      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  - Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the
    world. While this service is considered valuable and important to the free
    and open source software community, the authenticity and the integrity of
    a package needs to be verified to ensure that it has not been tampered
    with.

    There are two verification methods that can be used independently from
    each other to prove the authenticity of a downloaded file or RPM package:

    1) Using the internal gpg signatures of the rpm package
    2) MD5 checksums as provided in this announcement

    1) The internal rpm package signatures provide an easy way to verify the
       authenticity of an RPM package. Use the command

        rpm -v --checksig <file.rpm>

       to verify the signature of the package, replacing <file.rpm> with the
       filename of the RPM package downloaded. The package is unmodified if it
       contains a valid signature from build@suse.de with the key ID 9C800ACA.

       This key is automatically imported into the RPM database (on
       RPMv4-based distributions) and the gpg key ring of 'root' during
       installation. You can also find it on the first installation CD and at
       the end of this announcement.

    2) If you need an alternative means of verification, use the md5sum
       command to verify the authenticity of the packages. Execute the command

         md5sum <filename.rpm>

       after you downloaded the file from a SUSE FTP server or its mirrors.
       Then compare the resulting md5sum with the one that is listed in the
       SUSE security announcement. Because the announcement containing the
       checksums is cryptographically signed (by security@suse.de), the
       checksums show proof of the authenticity of the package if the
       signature of the announcement is valid. Note that the md5 sums
       published in the SUSE Security Announcements are valid for the
       respective packages only. Newer versions of these packages cannot be
       verified.

  - SUSE runs two security mailing lists to which any interested party may
    subscribe:

    suse-security@suse.com
        -   General Linux and SUSE security discussion.
            All SUSE security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-subscribe@suse.com>.

    suse-security-announce@suse.com
        -   SUSE's announce-only mailing list.
            Only SUSE's security announcements are sent to this list.
            To subscribe, send an e-mail to
                <suse-security-announce-subscribe@suse.com>.

    For general information or the frequently asked questions (FAQ),
    send mail to <suse-security-info@suse.com> or
    <suse-security-faq@suse.com>.

    =====================================================================
    SUSE's security contact is <security@suse.com> or <security@suse.de>.
    The <security@suse.de> public key is listed below.
    =====================================================================
______________________________________________________________________________

    The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In particular, the
    clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever
    with respect to the information contained in this security advisory.

Type Bits/KeyID    Date       User ID
pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>
pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=LRKC
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)

iQEVAwUBQyq803ey5gA9JdPZAQHlrgf9Hft0fRxo23f+I7UvrY+JimUMzjq7//TB
robXj4r96MdI4jWOOk+0pzi2dQy1LHkHv/UQBKYAWdZvKvDRYtehvUKFFFI0ALS+
yaEWsfIAiGGrQZllqYOIKDd+bpwVSrD80xS5nsKz7C0D1EX25XmyxothbjRNWUOm
KBkD1zwbUzTH02qS+473uW1uZc+GpHuqt8sVOFGkYC13Sk5KGqTWQI3E00/116Fk
wYfq6gppi7Uwqv8qE3BCkbVi/jqgIRgdp2lcNlq9jDJKE7x9Ve3VzfDjges5MFMA
STdqeoTwqppS8ODIcDCQJK0lGr1C7QwSl4nX8PmQ2ZDy7H8276PSWw==
=jO0s
-----END PGP SIGNATURE-----
    

- 漏洞信息 (F39987)

OpenPKG Security Advisory 2005.21 (PacketStormID:F39987)
2005-09-13 00:00:00
OpenPKG Foundation  openpkg.org
advisory,remote,denial of service
CVE-2005-2794,CVE-2005-2796
[点击下载]

OpenPKG Security Advisory - Two Denial of Service (DoS) security issues were discovered in the Squid Internet proxy. The first DoS is possible via certain aborted requests that trigger an assertion error related to STORE_PENDING. The second problem allows remote attackers to cause a DoS via certain crafted requests and SSL timeouts.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory                            The OpenPKG Project
http://www.openpkg.org/security.html              http://www.openpkg.org
openpkg-security@openpkg.org                         openpkg@openpkg.org
OpenPKG-SA-2005.021                                          10-Sep-2005
________________________________________________________________________

Package:             squid
Vulnerability:       denial of service
OpenPKG Specific:    no

Affected Releases:   Affected Packages:       Corrected Packages:
OpenPKG CURRENT      <= squid-2.5.10-20050709 >= squid-2.5.10-20050910 
OpenPKG 2.4          <= squid-2.5.10-2.4.0    >= squid-2.5.10-2.4.1    
OpenPKG 2.3          <= squid-2.5.9-2.3.0     >= squid-2.5.9-2.3.1     

Dependent Packages:  none

Description:
  Two Denial of Service (DoS) security issues were discovered in the
  Squid [0] Internet proxy. The first DoS is possible via certain
  aborted requests that trigger an assertion error related to
  "STORE_PENDING". The Common Vulnerabilities and Exposures (CVE)
  project assigned the id CAN-2005-2794 [1] to the problem. The second
  problem allows remote attackers to cause a DoS via certain crafted
  requests and SSL timeouts. The Common Vulnerabilities and Exposures
  (CVE) project assigned the id CAN-2005-2796 [2] to the problem.

  Please check whether you are affected by running "<prefix>/bin/openpkg
  rpm -q squid". If you have the "squid" package installed and its
  version is affected (see above), we recommend that you immediately
  upgrade it (see Solution) [3][4].

Solution:
  Select the updated source RPM appropriate for your OpenPKG release
  [5][6], fetch it from the OpenPKG FTP service [7][8] or a mirror
  location, verify its integrity [9], build a corresponding binary RPM
  from it [3] and update your OpenPKG installation by applying the
  binary RPM [4]. For the most recent release OpenPKG 2.4, perform the
  following operations to permanently fix the security problem (for
  other releases adjust accordingly).

  $ ftp ftp.openpkg.org
  ftp> bin
  ftp> cd release/2.4/UPD
  ftp> get squid-2.5.10-2.4.1.src.rpm
  ftp> bye
  $ <prefix>/bin/openpkg rpm -v --checksig squid-2.5.10-2.4.1.src.rpm
  $ <prefix>/bin/openpkg rpm --rebuild squid-2.5.10-2.4.1.src.rpm
  $ su -
  # <prefix>/bin/openpkg rpm -Fvh <prefix>/RPM/PKG/squid-2.5.10-2.4.1.*.rpm
________________________________________________________________________

References:
  [0] http://www.squid-cache.org/
  [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2794
  [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2796
  [3] http://www.openpkg.org/tutorial.html#regular-source
  [4] http://www.openpkg.org/tutorial.html#regular-binary
  [5] ftp://ftp.openpkg.org/release/2.4/UPD/squid-2.5.10-2.4.1.src.rpm
  [6] ftp://ftp.openpkg.org/release/2.3/UPD/squid-2.5.9-2.3.1.src.rpm
  [7] ftp://ftp.openpkg.org/release/2.4/UPD/
  [8] ftp://ftp.openpkg.org/release/2.3/UPD/
  [9] http://www.openpkg.org/security.html#signature
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG <openpkg@openpkg.org>" (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from http://pgp.openpkg.org and
hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
for details on how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG <openpkg@openpkg.org>

iD8DBQFDIvf/gHWT4GPEy58RAnCnAKDrvmGNftc9jHI+PDzE9wDUHNja4QCffSdO
Qa9zYyI7QLe9aZLBxbNyG5c=
=2dyO
-----END PGP SIGNATURE-----
    

- 漏洞信息

19237
Squid storeBuffer() Unspecified Remote DoS
Remote / Network Access Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-09-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Squid Proxy Aborted Requests Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 14761
Yes No
2005-09-01 12:00:00 2006-12-20 09:32:00
Discovery is credited to Nickolay.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Workstation 7.0
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Server 8.0
Turbolinux Turbolinux Server 7.0
Turbolinux Appliance Server Workgroup Edition 1.0
Turbolinux Appliance Server Hosting Edition 1.0
Turbolinux Appliance Server 1.0 Workgroup Edition
Turbolinux Appliance Server 1.0 Hosting Edition
SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 7
+ Linux kernel 2.4.19
Squid Web Proxy Cache 2.5 .STABLE9
+ Debian Linux 3.1 sparc
+ Debian Linux 3.1 s/390
+ Debian Linux 3.1 ppc
+ Debian Linux 3.1 mipsel
+ Debian Linux 3.1 mips
+ Debian Linux 3.1 m68k
+ Debian Linux 3.1 ia-64
+ Debian Linux 3.1 ia-32
+ Debian Linux 3.1 hppa
+ Debian Linux 3.1 arm
+ Debian Linux 3.1 amd64
+ Debian Linux 3.1 alpha
+ Debian Linux 3.1
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.2 x86_64
+ Mandriva Linux Mandrake 10.2
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
Squid Web Proxy Cache 2.5 .STABLE8
+ Gentoo Linux
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
+ Ubuntu Ubuntu Linux 5.0 4 powerpc
+ Ubuntu Ubuntu Linux 5.0 4 i386
+ Ubuntu Ubuntu Linux 5.0 4 amd64
Squid Web Proxy Cache 2.5 .STABLE7
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ Gentoo Linux
+ Red Hat Fedora Core3
+ Red Hat Fedora Core2
Squid Web Proxy Cache 2.5 .STABLE6
+ Mandriva Linux Mandrake 10.1 x86_64
+ S.u.S.E. Linux Personal 9.2 x86_64
+ S.u.S.E. Linux Personal 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Turbolinux Server 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Server 7.0
+ Turbolinux Turbolinux Workstation 8.0
+ Turbolinux Turbolinux Workstation 7.0
Squid Web Proxy Cache 2.5 .STABLE5
+ Conectiva Linux 10.0
+ Conectiva Linux 9.0
+ S.u.S.E. Linux Personal 9.1 x86_64
+ S.u.S.E. Linux Personal 9.1
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Squid Web Proxy Cache 2.5 .STABLE4
+ MandrakeSoft Corporate Server 3.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ OpenPKG OpenPKG 2.0
+ OpenPKG OpenPKG Current
Squid Web Proxy Cache 2.5 .STABLE3
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ OpenPKG OpenPKG 1.3
+ Red Hat Enterprise Linux AS 3
+ Red Hat Fedora Core1
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
Squid Web Proxy Cache 2.5 .STABLE10
Squid Web Proxy Cache 2.5 .STABLE1
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
+ S.u.S.E. Linux Personal 8.2
Squid Web Proxy Cache 2.4 .STABLE7
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Red Hat Enterprise Linux AS 2.1 IA64
+ Red Hat Enterprise Linux AS 2.1
+ RedHat Enterprise Linux ES 2.1 IA64
+ RedHat Enterprise Linux ES 2.1
+ RedHat Enterprise Linux WS 2.1 IA64
+ RedHat Enterprise Linux WS 2.1
+ RedHat Linux Advanced Work Station 2.1
Squid Web Proxy Cache 2.4 .STABLE6
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Squid Web Proxy Cache 2.4 .STABLE4
Squid Web Proxy Cache 2.4 .STABLE2
Squid Web Proxy Cache 2.4
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
Squid Web Proxy Cache 2.3 .STABLE5
Squid Web Proxy Cache 2.3 .STABLE4
Squid Web Proxy Cache 2.1 PATCH2
Squid Web Proxy Cache 2.0 PATCH2
SGI ProPack 3.0 SP6
SCO Unixware 7.1.4
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. cvsup-16.1h-2.i386.rpm
+ S.u.S.E. Linux Personal 8.2
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux WS 2.1 IA64
RedHat Enterprise Linux WS 2.1
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Enterprise Linux ES 2.1 IA64
RedHat Enterprise Linux ES 2.1
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
RedHat Advanced Workstation for the Itanium Processor 2.1
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Red Hat Enterprise Linux AS 2.1 IA64
Red Hat Enterprise Linux AS 2.1
OpenPKG OpenPKG 2.4
OpenPKG OpenPKG 2.3
OpenPKG OpenPKG Current
Conectiva Linux 10.0

- 漏洞讨论

A remote denial-of-service vulnerability affects the Squid Proxy.

The problem arises under certain circumstances while handling aborted requests.

A remote attacker may leverage this issue to crash the affected Squid Proxy, denying service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Please see the referenced vendor advisories for more information and fixes.


Conectiva Linux 10.0

Squid Web Proxy Cache 2.3 .STABLE4

Squid Web Proxy Cache 2.4 .STABLE4

Squid Web Proxy Cache 2.4 .STABLE6

Squid Web Proxy Cache 2.4 .STABLE2

Squid Web Proxy Cache 2.5 .STABLE4

Squid Web Proxy Cache 2.5 .STABLE10

Squid Web Proxy Cache 2.5 .STABLE6

Squid Web Proxy Cache 2.5 .STABLE3

Squid Web Proxy Cache 2.5 .STABLE1

Squid Web Proxy Cache 2.5 .STABLE5

Squid Web Proxy Cache 2.5 .STABLE9

Squid Web Proxy Cache 2.5 .STABLE8

SCO Unixware 7.1.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站