Squid: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200502-04 / squid
||February 02, 2005
||February 02, 2005: 02
All supported architectures
#79495, #78776, #80201, #80341
Squid contains vulnerabilities in the code handling WCCP, HTTP and LDAP
which could lead to Denial of Service, access control bypass, web cache and
Squid is a full-featured Web proxy cache designed to run on Unix
systems. It supports proxying and caching of HTTP, FTP, and other
protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many other features.
Squid contains several vulnerabilities:
- Buffer overflow when handling WCCP recvfrom()
- Loose checking of HTTP headers (CAN-2005-0173 and
- Incorrect handling of LDAP login names with spaces
An attacker could exploit:
- the WCCP buffer overflow to cause Denial of Service.
- the HTTP header parsing vulnerabilities to inject arbitrary
response data, potentially leading to content spoofing, web cache
poisoning and other cross-site scripting or HTTP response splitting
- the LDAP issue to login with several variations of the same login
name, leading to log poisoning.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r5"