| VID |
22292 |
| Severity |
30 |
| Port |
8080,3128 |
| Protocol |
TCP |
| Class |
Webproxy |
| Detailed Description |
The Squid caching proxy, according to its version number, has a remote denial of service vulnerability. Squid is a freely available Web Proxy server for Linux distributions. Squid Web Proxy Cache versions 2.5-STABLE6 and 3.0-PRE3-20040702 and possibly earlier versions, compiled with SNMP support, are vulnerable to a denial of service attack, caused by a ASN1 parsing vulnerability in the SNMP module. The vulnerability is caused due to an input validation error in the SNMP module within the "asn_parse_header()" function when handling certain negative length fields. This can be exploited to restart Squid by sending a UDP datagram containing specially crafted header length combinations.
* Note: This check solely relied on the version number of the remote Squid caching proxy to assess this vulnerability, so this might be a false positive.
* References: http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities http://secunia.com/advisories/12791/ http://www.securitytracker.com/alerts/2004/Oct/1011614.html
* Platforms Affected: National Science Foundation, Squid Web Proxy Cache 2.5-STABLE6 and earlier National Science Foundation, Squid Web Proxy Cache 3.0-PRE3-20040702 Linux Any version Unix Any version |
| Recommendation |
Apply the SNMP_core_dump patch or upgrade to the latest version of Squid (2.5.STABLE7 or later), available from the Squid Web Proxy Cache Web site at http://www.squid-cache.org/Versions/v2/2.5/ |
| Related URL |
CVE-2004-0918 (CVE) |
| Related URL |
11385 (SecurityFocus) |
| Related URL |
17688 (ISS) |
|