EulerOS 2.0 SP8 squid package Cache Manager Denial of Service vulnerabilit
Reporter | Title | Published | Views | Family All 72 |
---|---|---|---|---|
Veracode | Expired Pointer Dereference | 24 Jan 202408:40 | – | veracode |
UbuntuCve | CVE-2024-23638 | 24 Jan 202400:00 | – | ubuntucve |
RedhatCVE | CVE-2024-23638 | 25 Jan 202420:00 | – | redhatcve |
Cvelist | CVE-2024-23638 SQUID-2023:11 Denial of Service in Cache Manager | 23 Jan 202423:23 | – | cvelist |
OpenVAS | Huawei EulerOS: Security Advisory for squid (EulerOS-SA-2024-2053) | 22 Jul 202400:00 | – | openvas |
OpenVAS | Huawei EulerOS: Security Advisory for squid (EulerOS-SA-2024-2491) | 23 Sep 202400:00 | – | openvas |
OpenVAS | Squid DoS Vulnerability (GHSA-j49p-553x-48rx, SQUID-2023:11) | 20 Oct 202300:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2024:0296-1) | 2 Feb 202400:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2024:0298-1) | 2 Feb 202400:00 | – | openvas |
OpenVAS | SUSE: Security Advisory (SUSE-SU-2024:0455-1) | 14 Feb 202400:00 | – | openvas |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(207613);
script_version("1.1");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/24");
script_cve_id("CVE-2024-23638");
script_name(english:"EulerOS 2.0 SP8 : squid (EulerOS-SA-2024-2491)");
script_set_attribute(attribute:"synopsis", value:
"The remote EulerOS host is missing a security update.");
script_set_attribute(attribute:"description", value:
"According to the versions of the squid package installed, the EulerOS installation on the remote host is affected by the
following vulnerabilities :
Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6
is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a
trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid
older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and
including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by
Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in
Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access
control: `http_access deny manager`.(CVE-2024-23638)
Tenable has extracted the preceding description block directly from the EulerOS squid security advisory.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
# https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2024-2491
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ae9af45d");
script_set_attribute(attribute:"solution", value:
"Update the affected squid packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-23638");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/01/23");
script_set_attribute(attribute:"patch_publication_date", value:"2024/09/23");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/09/24");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:huawei:euleros:squid");
script_set_attribute(attribute:"cpe", value:"cpe:/o:huawei:euleros:2.0");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Huawei Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/EulerOS/release", "Host/EulerOS/rpm-list", "Host/EulerOS/sp");
script_exclude_keys("Host/EulerOS/uvp_version");
exit(0);
}
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var _release = get_kb_item("Host/EulerOS/release");
if (isnull(_release) || _release !~ "^EulerOS") audit(AUDIT_OS_NOT, "EulerOS");
var uvp = get_kb_item("Host/EulerOS/uvp_version");
if (_release !~ "^EulerOS release 2\.0(\D|$)") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
var sp = get_kb_item("Host/EulerOS/sp");
if (isnull(sp) || sp !~ "^(8)$") audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8");
if (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, "EulerOS 2.0 SP8", "EulerOS UVP " + uvp);
if (!get_kb_item("Host/EulerOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
var cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "aarch64" >!< cpu && "x86" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "EulerOS", cpu);
if ("aarch64" >!< cpu) audit(AUDIT_ARCH_NOT, "aarch64", cpu);
var flag = 0;
var pkgs = [
"squid-4.2-2.h22.eulerosv2r8"
];
foreach (var pkg in pkgs)
if (rpm_check(release:"EulerOS-2.0", sp:"8", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
var tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "squid");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo