Boletines de Vulnerabilidades |
Denegación de servicio en Squid |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Denegación de Servicio |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio exotico |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | Squid <= 2.5.STABLE10 |
Descripción |
|
Se ha descubierto una vulnerabilidad de denegación de servicio en Squid 2.5.STABLE10 y anteriores. La vulnerabilidad reside en que al realizar autenticación NTLM ciertas peticiones no se manejan de forma adecuada. Un atacante remoto podría causar una denegación de servicio mediante peticiones especialmente diseñadas. |
|
Solución |
|
Actualización de software Debian Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2.dsc http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2.diff.gz http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/s/squid/squid-common_2.5.9-10sarge2_all.deb Alpha http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_alpha.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_alpha.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_alpha.deb AMD64 http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_amd64.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_amd64.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_amd64.deb ARM http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_arm.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_arm.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_i386.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_i386.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_ia64.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_ia64.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_ia64.deb HP Precision http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_hppa.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_hppa.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_hppa.deb Motorola 680x0 http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_m68k.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_m68k.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_m68k.deb Big endian MIPS http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_mips.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_mips.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_mipsel.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_mipsel.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_powerpc.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_powerpc.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_s390.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_s390.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/s/squid/squid_2.5.9-10sarge2_sparc.deb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.5.9-10sarge2_sparc.deb http://security.debian.org/pool/updates/main/s/squid/squidclient_2.5.9-10sarge2_sparc.deb Mandriva Linux Mandrakelinux 10.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/squid-2.5.STABLE9-1.4.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/squid-2.5.STABLE9-1.4.101mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/squid-2.5.STABLE9-1.4.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/squid-2.5.STABLE9-1.4.101mdk.src.rpm Corporate Server 2.1 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/squid-2.4.STABLE7-2.9.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.9.C21mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/squid-2.4.STABLE7-2.9.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.9.C21mdk.src.rpm Corporate Server 3.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/squid-2.5.STABLE9-1.4.C30mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/squid-2.5.STABLE9-1.4.C30mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/RPMS/squid-2.5.STABLE9-1.4.C30mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/3.0/SRPMS/squid-2.5.STABLE9-1.4.C30mdk.src.rpm Multi Network Firewall 2.0 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/RPMS/squid-2.5.STABLE9-1.4.M20mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf/2.0/SRPMS/squid-2.5.STABLE9-1.4.M20mdk.src.rpm Mandrivalinux LE2005 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/RPMS/squid-2.5.STABLE9-1.4.102mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.2/SRPMS/squid-2.5.STABLE9-1.4.102mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/RPMS/squid-2.5.STABLE9-1.4.102mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.2/SRPMS/squid-2.5.STABLE9-1.4.102mdk.src.rpm Mandrivalinux 2006 X86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/squid-2.5.STABLE10-10.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/RPMS/squid-cachemgr-2.5.STABLE10-10.1.20060mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/2006.0/SRPMS/squid-2.5.STABLE10-10.1.20060mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/squid-2.5.STABLE10-10.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/RPMS/squid-cachemgr-2.5.STABLE10-10.1.20060mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/2006.0/SRPMS/squid-2.5.STABLE10-10.1.20060mdk.src.rpm Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux SCO UnixWare 7.1.4 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.44 Red Hat Red Hat Desktop (v. 4) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 4) Red Hat Desktop (v. 3) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) https://rhn.redhat.com/ SGI Advanced Linux Environment 3 / RPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/RPMS Advanced Linux Environment 3 / SRPM / Patch 10291 ftp://oss.sgi.com/projects/sgi_propack/download/3/updates/SRPMS |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2005-2917 |
BID | |
Recursos adicionales |
|
Debian Security Advisory (DSA 828-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00220.html Mandriva Security Advisory (MDKSA-2005:181) http://www.mandriva.com/security/advisories?name=MDKSA-2005:181 SUSE Security Advisory (SUSE-SR:2005:025) http://www.novell.com/linux/security/advisories/2005_25_sr.html SUSE Security Advisory (SUSE-SR:2005:027) http://www.novell.com/linux/security/advisories/2005_27_sr.html SCO Security Advisory (SCOSA-2005.44) ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.44/SCOSA-2005.44.txt Red Hat Security Advisory (RHSA-2006:0052-7) https://rhn.redhat.com/errata/RHSA-2006-0052.html Red Hat Security Advisory (RHSA-2006:0045-8) https://rhn.redhat.com/errata/RHSA-2006-0045.html SGI Security Advisory (20060401-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060401-01.U.asc |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2005-10-06 |
1.1 | Aviso emitido por Mandriva (MDKSA-2005:181) | 2005-10-17 |
1.2 | Aviso emitido por Suse (SUSE-SR:2005:025) | 2005-11-14 |
1.3 | Aviso emitido por Suse (SUSE-SR:2005:027) | 2005-11-23 |
1.4 | Aviso emitido por SCO (SCOSA-2005.44) | 2005-11-28 |
1.5 | Aviso emitido por Red Hat (RHSA-2006:0052-7) | 2006-03-08 |
1.6 | Aviso emitido por Red Hat (RHSA-2006:0045-8) | 2006-03-16 |
1.7 | Aviso emitido por SGI (20060401-01-U) | 2006-04-05 |