blob: 9cdf5e07d7e6c6b8ab97c1150734a1f1dbc6e6a8 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200502-25">
<title>Squid: Denial of Service through DNS responses</title>
Squid contains a bug in the handling of certain DNS responses resulting in
a Denial of Service.
<product type="ebuild">Squid</product>
<announced>February 18, 2005</announced>
<revised>February 18, 2005: 01</revised>
<package name="net-proxy/squid" auto="yes" arch="*">
<unaffected range="ge">2.5.8</unaffected>
<vulnerable range="lt">2.5.8</vulnerable>
Squid is a full-featured Web proxy cache designed to run on
Unix-like systems. It supports proxying and caching of HTTP, FTP, and
other protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many other features.
Handling of certain DNS responses trigger assertion failures.
<impact type="normal">
By returning a specially crafted DNS response an attacker could
cause Squid to crash by triggering an assertion failure.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.8&quot;</code>
<uri link="">CAN-2005-0446</uri>
<metadata tag="requester" timestamp="Thu, 17 Feb 2005 20:33:19 +0000">
<metadata tag="submitter" timestamp="Thu, 17 Feb 2005 21:28:52 +0000">
<metadata tag="bugReady" timestamp="Fri, 18 Feb 2005 09:26:51 +0000">