Vulnerabilidad en Squid Proxy Cache
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Aumento de la visibilidad |
Dificulty |
Principiante |
Required attacker level |
Acceso remoto sin cuenta a un servicio estandar |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
Squid 2.x <=2.5STABLE4 |
Description
|
Se ha descubierto un error de validación de entrada en las versiones 2.x anteriores e igual a la 2.5 STABLE4 de Squid. La explotación de esta vulnerabilidad podría permitir a un atacante remoto saltarse Listas de Control de Acceso (ACL) del tipo "url_regex" mediante el uso de URL especialmente diseñadas.
Nótese que, si bien sólo RedHat ha emitido un aviso al respecto, esta vulnerabilidad afecta a cualquier distribución que incluya una versión vulnerable del paquete Squid. |
Solution
|
Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.
Actualización de software
Squid
Squid-2.4.STABLE5
ftp://ftp.squid-cache.org/pub/squid-2/STABLE/
RedHat Linux
RedHat Linux 9
SRPMS
ftp://updates.redhat.com/9/en/os/SRPMS/squid-2.5.STABLE1-3.9.src.rpm
i386
ftp://updates.redhat.com/9/en/os/i386/squid-2.5.STABLE1-3.9.i386.rpm
Mandrake Linux
Mandrake Linux 9.1
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/RPMS/squid-2.5.STABLE1-7.1.91mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.1/SRPMS/squid-2.5.STABLE1-7.1.91mdk.src.rpm
PPC
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/RPMS/squid-2.5.STABLE1-7.1.91mdk.ppc.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/ppc/9.1/SRPMS/squid-2.5.STABLE1-7.1.91mdk.src.rpm
Mandrake Linux 9.2
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/RPMS/squid-2.5.STABLE3-3.1.92mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/9.2/SRPMS/squid-2.5.STABLE3-3.1.92mdk.src.rpm
AMD64
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/RPMS/squid-2.5.STABLE3-3.1.92mdk.amd64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/amd64/9.2/SRPMS/squid-2.5.STABLE3-3.1.92mdk.src.rpm
Multi Network Firewall 8.2
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/mnf8.2/RPMS/squid-2.4.STABLE7-1.2.M82mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/mnf8.2/SRPMS/squid-2.4.STABLE7-1.2.M82mdk.src.rpm
Corporate Server 2.1
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/corporate/2.1/RPMS/squid-2.4.STABLE7-2.1.C21mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.1.C21mdk.src.rpm
x86_64
ftp://ftp.rediris.es/mirror/mandrake/updates/x86_64/corporate/2.1/RPMS/squid-2.4.STABLE7-2.1.C21mdk.x86_64.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/x86_64/corporate/2.1/SRPMS/squid-2.4.STABLE7-2.1.C21mdk.src.rpm
Mandrakelinux 10.0
i386
ftp://ftp.rediris.es/mirror/mandrake/updates/10.0/RPMS/squid-2.5.STABLE4-1.100mdk.i586.rpm
ftp://ftp.rediris.es/mirror/mandrake/updates/10.0/SRPMS/squid-2.5.STABLE4-1.100mdk.src.rpm
Debian Linux
Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2.dsc
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2.diff.gz
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6.orig.tar.gz
Alpha
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_alpha.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_alpha.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_alpha.deb
ARM
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_arm.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_arm.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_i386.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_i386.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_ia64.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_ia64.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_hppa.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_hppa.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_m68k.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_m68k.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_mips.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_mips.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody1_mipsel.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody1_mipsel.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody1_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_powerpc.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_powerpc.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_s390.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_s390.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody2_sparc.deb
http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody2_sparc.deb
http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody2_sparc.deb
SCO OpenServer
OpenServer 5.0.6
ftp://ftp.sco.com/pub/openserver5/oss646c/
ftp://ftp.sco.com/pub/openserver5/opensrc/xorg-6.7.0Ba/
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10
ftp://ftp.sco.com/pub/openserver5/opensrc/perl-5.8.4Aa/
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.13
OpenServer 5.0.7
http://www.sco.com/support/update/download/osr507list.html
SCO UnixWare
UnixWare 7.1.4
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/squid.pkg |
Standar resources
|
Property |
Value |
CVE |
CAN-2004-0189 |
BID |
NULL |
Other resources
|
Squid Proxy Cache Security Update Advisory SQUID-2004:1
http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
RedHat Security Advisory RHSA-2004:134-05
https://rhn.redhat.com/errata/RHSA-2004-134.html
MandrakeSoft Security Advisory MDKSA-2004:025
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:025
Debian Security Advisory DSA 474-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00072.html
SCO Security Advisory SCOSA-2004.13
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.13/SCOSA-2004.13.txt
SCO Security Advisory SCOSA-2005.16
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.16/SCOSA-2005.16.txt |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2004-03-30
|
1.1
|
Aviso emitido por Mandrake
|
2004-03-31
|
1.2
|
Aviso emitido por Debian
|
2004-04-05
|
1.3
|
Aviso emitido por SCO (SCOSA-2004.13)
|
2004-09-02
|
1.4
|
Aviso emitido por SCO (SCOSA-2005.16)
|
2005-03-02
|