Lucene search

K
gentooGentoo FoundationGLSA-200504-11
HistoryApr 13, 2005 - 12:00 a.m.

JunkBuster: Multiple vulnerabilities

2005-04-1300:00:00
Gentoo Foundation
security.gentoo.org
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.078 Low

EPSS

Percentile

94.3%

Background

JunkBuster is a filtering HTTP proxy, designed to enhance privacy and remove unwanted content.

Description

James Ranson reported a vulnerability when JunkBuster is configured to run in single-threaded mode, an attacker can modify the referrer setting by getting a victim to request a specially crafted URL (CAN-2005-1108). Tavis Ormandy of the Gentoo Linux Security Audit Team identified a heap corruption issue in the filtering of URLs (CAN-2005-1109).

Impact

If JunkBuster has been configured to run in single-threaded mode, an attacker can disable or modify the filtering of Referrer: HTTP headers, potentially compromising the privacy of users. The heap corruption vulnerability could crash or disrupt the operation of the proxy, potentially executing arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All JunkBuster users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-proxy/junkbuster-2.0.2-r3"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-proxy/junkbuster< 2.0.2-r3UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.078 Low

EPSS

Percentile

94.3%