Lucene search

K

CentOS 3 / 4 / 5 : squid (CESA-2007:1130)

πŸ—“οΈΒ 19 Dec 2007Β 00:00:00Reported byΒ This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.TypeΒ 
nessus
Β nessus
πŸ”—Β www.tenable.comπŸ‘Β 22Β Views

Updated squid packages available for CentOS 3 / 4 / 5 to fix a security issu

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Fedora
[SECURITY] Fedora 7 Update: squid-2.6.STABLE16-2.fc7
15 Dec 200719:27
–fedora
Fedora
[SECURITY] Fedora 8 Update: squid-2.6.STABLE17-1.fc8
15 Dec 200719:27
–fedora
Cvelist
CVE-2007-6239
4 Dec 200718:00
–cvelist
Cvelist
CVE-2008-1612
1 Apr 200817:00
–cvelist
Prion
Memory corruption
4 Dec 200718:46
–prion
Prion
Code injection
1 Apr 200817:44
–prion
CVE
CVE-2007-6239
4 Dec 200718:46
–cve
CVE
CVE-2008-1612
1 Apr 200817:44
–cve
OpenVAS
SLES9: Security update for squid
10 Oct 200900:00
–openvas
OpenVAS
Mandriva Update for squid MDVSA-2008:002 (squid)
9 Apr 200900:00
–openvas
Rows per page
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Red Hat Security Advisory RHSA-2007:1130 and 
# CentOS Errata and Security Advisory 2007:1130 respectively.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(29730);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");

  script_cve_id("CVE-2007-6239");
  script_xref(name:"RHSA", value:"2007:1130");

  script_name(english:"CentOS 3 / 4 / 5 : squid (CESA-2007:1130)");
  script_summary(english:"Checks rpm output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote CentOS host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"Updated squid packages that fix a security issue are now available for
Red Hat Enterprise Linux 2.1, 3, 4 and 5.

This update has been rated as having moderate security impact by the
Red Hat Security Response Team.

Squid is a high-performance proxy caching server for Web clients,
supporting FTP, gopher, and HTTP data objects.

A flaw was found in the way squid stored HTTP headers for cached
objects in system memory. An attacker could cause squid to use
additional memory, and trigger high CPU usage when processing requests
for certain cached objects, possibly leading to a denial of service.
(CVE-2007-6239)

Users of squid are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue."
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014514.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?4c041705"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014515.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?9ba5b357"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014516.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?e7398daa"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014518.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?6ef35273"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014522.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?a4cea42a"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014523.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?f3bd00fd"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014539.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?5edb8616"
  );
  # https://lists.centos.org/pipermail/centos-announce/2007-December/014540.html
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.nessus.org/u?fc3da73b"
  );
  script_set_attribute(attribute:"solution", value:"Update the affected squid package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_cwe_id(20);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:squid");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:3");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5");

  script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/04");
  script_set_attribute(attribute:"patch_publication_date", value:"2007/12/18");
  script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/19");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2007-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"CentOS Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/CentOS/release");
if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS");
os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS");
os_ver = os_ver[1];
if (! preg(pattern:"^(3|4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 3.x / 4.x / 5.x", "CentOS " + os_ver);

if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);


cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu);


flag = 0;
if (rpm_check(release:"CentOS-3", reference:"squid-2.5.STABLE3-8.3E")) flag++;

if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"squid-2.5.STABLE14-1.4E.el4_6.1")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"ia64", reference:"squid-2.5.STABLE14-1.4E.c4.1")) flag++;
if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"squid-2.5.STABLE14-1.4E.el4_6.1")) flag++;

if (rpm_check(release:"CentOS-5", reference:"squid-2.6.STABLE6-5.el5_1.2")) flag++;


if (flag)
{
  security_report_v4(
    port       : 0,
    severity   : SECURITY_WARNING,
    extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "squid");
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
19 Dec 2007 00:00Current
6.2Medium risk
Vulners AI Score6.2
CVSS25
EPSS0.328
22
.json
Report