Korean
<< Back
VID 22292
Severity 30
Port 8080,3128
Protocol TCP
Class Webproxy
Detailed Description The Squid caching proxy, according to its version number, has a remote denial of service vulnerability. Squid is a freely available Web Proxy server for Linux distributions. Squid Web Proxy Cache versions 2.5-STABLE6 and 3.0-PRE3-20040702 and possibly earlier versions, compiled with SNMP support, are vulnerable to a denial of service attack, caused by a ASN1 parsing vulnerability in the SNMP module. The vulnerability is caused due to an input validation error in the SNMP module within the "asn_parse_header()" function when handling certain negative length fields. This can be exploited to restart Squid by sending a UDP datagram containing specially crafted header length combinations.

* Note: This check solely relied on the version number of the remote Squid caching proxy to assess this vulnerability, so this might be a false positive.

* References:
http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities
http://secunia.com/advisories/12791/
http://www.securitytracker.com/alerts/2004/Oct/1011614.html

* Platforms Affected:
National Science Foundation, Squid Web Proxy Cache 2.5-STABLE6 and earlier
National Science Foundation, Squid Web Proxy Cache 3.0-PRE3-20040702
Linux Any version
Unix Any version
Recommendation Apply the SNMP_core_dump patch or upgrade to the latest version of Squid (2.5.STABLE7 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v2/2.5/
Related URL CVE-2004-0918 (CVE)
Related URL 11385 (SecurityFocus)
Related URL 17688 (ISS)