Korean
<< Back
VID 22269
Severity 40
Port 3128,8080
Protocol TCP
Class Webproxy
Detailed Description The Squid caching proxy, according to its version number, is vulnerable to a NTLM authentication buffer overflow vulnerability.
Squid is a freely available Web Proxy server for Linux distributions. Squid Web Proxy Cache versions 2.5-STABLE and 3-PRE are vulnerable to a buffer overflow vulnerability when processing NTLM authentication credentials. This flaw is due to a failure of the application to properly validate buffer boundaries when copying user-supplied input. A remote attacker can compromise a target system if Squid Proxy is configured to use the NTLM authentication helper. The attacker can send an overly long password ("pass" variable) to overflow the buffer and execute arbitrary code on the system.

* Note: This check solely relied on the version number of the remote Squid caching proxy server to assess this vulnerability, so this might be a false positive.

* References:
http://www.ciac.org/ciac/bulletins/o-168.shtml
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0191.html

* Platforms Affected:
National Science Foundation, Squid Web Proxy Cache 2.5-STABLE
National Science Foundation, Squid Web Proxy Cache 3-PRE
Linux Any version
Unix Any version
Recommendation For Squid Web Proxy Cache 2.5-STABLE:
Apply the patch for this vulnerability, as listed in official Squid-2.5 Patches site at http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE5-ntlm_auth_overflow.patch

For Red Hat Linux:
Upgrade to the latest squid package, as listed in Red Hat Security Advisory RHSA-2004:242-06 at https://rhn.redhat.com/errata/RHSA-2004-242.html

For SuSE Linux:
Upgrade to the latest squid package, as listed in SuSE Security Announcement SuSE-SA:2004:016 at http://www.suse.de/de/security/2004_16_squid.html

For Mandrake Linux:
Upgrade to the latest squid package, as listed in MandrakeSoft Security Advisory MDKSA-2004:059 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:059

For Trustix Secure Linux:
Upgrade to the latest squid package, as listed in Trustix Secure Linux Security Advisory #2004-0033 at http://www.linuxsecurity.com/advisories/trustix_advisory-4447.html

For Gentoo Linux:
Upgrade to the latest version of squid (2.5.5-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200406-13 at http://www.linuxsecurity.com/advisories/gentoo_advisory-4476.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0541 (CVE)
Related URL 10500 (SecurityFocus)
Related URL 16360 (ISS)