[RHSA-2005:061-01] Updated Squid package fixes security issues

bugzilla at redhat.com bugzilla at redhat.com
Fri Feb 11 13:50:00 UTC 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated Squid package fixes security issues
Advisory ID:       RHSA-2005:061-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2005-061.html
Issue date:        2005-02-11
Updated on:        2005-02-11
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2005-0094 CAN-2005-0095 CAN-2005-0096 CAN-2005-0097 CAN-2005-0173 CAN-2005-0174 CAN-2005-0175 CAN-2005-0211 CAN-2005-0241
- ---------------------------------------------------------------------

1. Summary:

An updated Squid package that fixes several security issues is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Squid is a full-featured Web proxy cache.

A buffer overflow flaw was found in the Gopher relay parser. This bug
could allow a remote Gopher server to crash the Squid proxy that reads data
from it. Although Gopher servers are now quite rare, a malicious web page
(for example) could redirect or contain a frame pointing to an attacker's
malicious gopher server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0094 to this issue.

An integer overflow flaw was found in the WCCP message parser. It is
possible to crash the Squid server if an attacker is able to send a
malformed WCCP message with a spoofed source address matching Squid's
"home router". The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0095 to this issue.

A memory leak was found in the NTLM fakeauth_auth helper. It is possible
that an attacker could place the Squid server under high load, causing the
NTML fakeauth_auth helper to consume a large amount of memory, resulting in
a denial of service. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-0096 to this issue.

A NULL pointer de-reference bug was found in the NTLM fakeauth_auth helper.
It is possible for an attacker to send a malformed NTLM type 3 message,
causing the Squid server to crash. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0097 to
this issue.

A username validation bug was found in squid_ldap_auth. It is possible for
a username to be padded with spaces, which could allow a user to bypass
explicit access control rules or confuse accounting. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2005-0173 to this issue.

The way Squid handles HTTP responses was found to need strengthening. It is
possible that a malicious web server could send a series of HTTP responses
in such a way that the Squid cache could be poisoned, presenting users with
incorrect webpages. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2005-0174 and CAN-2005-0175 to
these issues.

A bug was found in the way Squid handled oversized HTTP response headers.
It is possible that a malicious web server could send a specially crafted
HTTP header which could cause the Squid cache to be poisoned, presenting
users with incorrect webpages.  The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-0241 to this issue.

A buffer overflow bug was found in the WCCP message parser. It is possible
that an attacker could send a malformed WCCP message which could crash the
Squid server or execute arbitrary code. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2005-0211
to this issue.

Users of Squid should upgrade to this updated package, which contains
backported patches, and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145540 - CAN-2005-0094 Multiple issues with squid (CAN-2005-0095 CAN-2005-0096 CAN-2005-0097)
146159 - CAN-2005-0173 Multiple squid issues (CAN-2005-0174 CAN-2005-0175)
146780 - CAN-2005-0241 Correct handling of oversized reply headers

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920  squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942  squid-2.4.STABLE7-1.21as.4.i386.rpm

ia64:
223ad64e00405758e505b1412a83ca65  squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920  squid-2.4.STABLE7-1.21as.4.src.rpm

ia64:
223ad64e00405758e505b1412a83ca65  squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920  squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942  squid-2.4.STABLE7-1.21as.4.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a  squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e  squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e  squid-2.5.STABLE3-6.3E.7.ia64.rpm

ppc:
eeabefd918d66aed11cfc1b28403b141  squid-2.5.STABLE3-6.3E.7.ppc.rpm

s390:
7a2b9540c7b55ee44984f796e39d806d  squid-2.5.STABLE3-6.3E.7.s390.rpm

s390x:
372366d5fbaa404527a43e9de8f46cdd  squid-2.5.STABLE3-6.3E.7.s390x.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61  squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a  squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e  squid-2.5.STABLE3-6.3E.7.i386.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61  squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a  squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e  squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e  squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61  squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a  squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e  squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e  squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61  squid-2.5.STABLE3-6.3E.7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
http://www.squid-cache.org/Advisories/SQUID-2005_2.txt
http://www.squid-cache.org/Advisories/SQUID-2005_3.txt
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_auth
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0241

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQFCDLgwXlSAg2UNWIIRAijmAJ9RPVzVaX2fDMS9Qs032YUMt3BHTQCgl9Mb
HTTQgPJBJ8xIXwFBTezCvZ0=
=OsgH
-----END PGP SIGNATURE-----





More information about the Enterprise-watch-list mailing list