Boletines de Vulnerabilidades |
Vulnerabilidad en Squid |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Integridad |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | Squid <=2.5 STABLE9 |
Descripción |
|
Se ha descubierto una vulnerabilidad en la versión 2.5 STABLE9 y anteriores de Squid. Cuando el puerto DNS del cliente no está filtrado y la red no está protegida contra ataques de IP spoofing Squid permite a atacantes remotos spoofear peticiones DNS. |
|
Solución |
|
Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo. Actualización de software Squid Squid 2.5 STABLE9 - Parche http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE9-dns_query-5.patch Red Hat Linux Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Linux Advanced Workstation 2.1 Itanium Processor Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Mandriva Linux Mandriva Linux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/squid-2.5.STABLE9-1.2.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/squid-2.5.STABLE9-1.2.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/squid-2.5.STABLE9-1.2.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/squid-2.5.STABLE9-1.2.101mdk.src.rpm Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/squid-2.4.STABLE7-2.7.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.7.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/squid-2.4.STABLE7-2.7.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.7.C21mdk.src.rpm Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squid-2.5.STABLE9-1.2.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/squid-2.5.STABLE9-1.2.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squid-2.5.STABLE9-1.2.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/squid-2.5.STABLE9-1.2.C30mdk.src.rpm Mandrivalinux LE2005 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/squid-2.5.STABLE9-1.2.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/squid-2.5.STABLE9-1.2.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/squid-2.5.STABLE9-1.2.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/squid-2.5.STABLE9-1.2.102mdk.src.rpm Debian Linux Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9.dsc http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9.diff.gz http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_alpha.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_alpha.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_alpha.deb ARM http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_arm.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_arm.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_i386.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_i386.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_ia64.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_ia64.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_ia64.deb HP Precision http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_hppa.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_hppa.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_m68k.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_m68k.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_mips.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_mips.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_mipsel.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_mipsel.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_powerpc.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_powerpc.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_s390.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_s390.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody9_sparc.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody9_sparc.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody9_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-1519 |
BID | |
Recursos adicionales |
|
Squid 2.5.STABLE9 Patches http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query Red Hat Security Advisory RHSA-2005:489-05 https://rhn.redhat.com/errata/RHSA-2005-489.html Red Hat Security Advisory RHSA-2005:415-16 https://rhn.redhat.com/errata/RHSA-2005-415.html Mandriva Security Advisories MDKSA-2005:104 http://www.mandriva.com/security/advisories?name=MDKSA-2005:104 Debian Security Advisory DSA 751-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00137.html |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2005-06-14 |
1.1 | Aviso emitido por Red Hat (RHSA-2005:415-16) | 2005-06-15 |
1.2 | Aviso emitido por Mandriva (MDKSA-2005:104) | 2005-06-27 |
1.3 | Aviso emitido por Debian (DSA 751-1) | 2005-07-12 |