Lucene search

K
osvGoogleOSV:DSA-667-1
HistoryFeb 04, 2005 - 12:00 a.m.

squid - several

2005-02-0400:00:00
Google
osv.dev
9

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Several vulnerabilities have been discovered in Squid, the internet
object cache, the popular WWW proxy cache. The Common Vulnerabilities
and Exposures project identifies the following vulnerabilities:

  • CAN-2005-0173
    LDAP is very forgiving about spaces in search filters and this
    could be abused to log in using several variants of the login
    name, possibly bypassing explicit access controls or confusing
    accounting.

  • CAN-2005-0175
    Cache pollution/poisoning via HTTP response splitting has been
    discovered.

  • CAN-2005-0194
    The meaning of the access controls becomes somewhat confusing if
    any of the referenced ACLs (access control lists) is declared
    empty, without any members.

  • CAN-2005-0211
    The length argument of the WCCP recvfrom() call is larger than it
    should be. An attacker may send a larger than normal WCCP packet
    that could overflow a buffer.

For the stable distribution (woody) these problems have been fixed in
version 2.4.6-2woody6.

For the unstable distribution (sid) these problems have been fixed in
version 2.5.7-7.

We recommend that you upgrade your squid package.

CPENameOperatorVersion
squideq2.4.6-2woody4

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C