Squid: Denial of Service through DNS responses
Gentoo Linux Security Advisory
||GLSA 200502-25 / Squid
||February 18, 2005
||February 18, 2005: 01
All supported architectures
Squid contains a bug in the handling of certain DNS responses resulting in
a Denial of Service.
Squid is a full-featured Web proxy cache designed to run on
Unix-like systems. It supports proxying and caching of HTTP, FTP, and
other protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many other features.
Handling of certain DNS responses trigger assertion failures.
By returning a specially crafted DNS response an attacker could
cause Squid to crash by triggering an assertion failure.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.8"