|
Family: Misc. --> Category: infos
Squid Multiple Flaws Vulnerability Scan
Vulnerability Scan Summary Acertains squid version
Detailed Explanation for this Vulnerability Test
The remote squid caching proxy, according to its version number,
is vulnerable to various security flaws :
- There is a buffer overflow issue when handling the reply of
a rogue gopher site. To exploit this issue, a possible hacker would
need to use the remote proxy to visit a specially setup gopher
site generating malformed replies
- There is a denial of service vulnerability in the WCCP code
of the remote proxy. To exploit this flaw, a possible hacker would need
to guess the IP of the WCCP router used by the proxy and spoof a
malformed UDP packet using the router IP address.
- There is a buffer overflow in the WCCP code which may allow a possible hacker
to execute arbitrary code on the remote host
- There is a flaw in the 'squid_ldap_auth' module which may allow
a possible hacker to bypass authentication and to gain access to the
remote proxy
- There is a flaw in the way Squid parses HTTP reply headers
*** Given the way the Squid team handles releases, this may be a
*** false positive. Make sure that all the appropriate patches
*** have been applied.
Solution : Upgrade to squid 2.5.STABLE8 (when available) or newer
See also : http://www.squid-cache.org/Versions/v2/2.5/bugs/
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|