blob: 44e14710e2896a13c2c7a85daece16f717b50a44 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200509-06">
<title>Squid: Denial of Service vulnerabilities</title>
Squid contains several bugs when handling certain malformed requests
resulting in a Denial of Service.
<product type="ebuild">Squid</product>
<announced>September 07, 2005</announced>
<revised>May 22, 2006: 03</revised>
<package name="net-proxy/squid" auto="yes" arch="*">
<unaffected range="ge">2.5.10-r2</unaffected>
<vulnerable range="lt">2.5.10-r2</vulnerable>
Squid is a full-featured Web proxy cache designed to run on Unix-like
systems. It supports proxying and caching of HTTP, FTP, and other
protocols, as well as SSL support, cache hierarchies, transparent
caching, access control lists and many more features.
Certain malformed requests result in a segmentation fault in the
sslConnectTimeout function, handling of other certain requests trigger
assertion failures.
<impact type="normal">
By performing malformed requests an attacker could cause Squid to crash
by triggering an assertion failure or invalid memory reference.
There is no known workaround at this time.
All Squid users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-proxy/squid-2.5.10-r2&quot;</code>
<uri link="">Squid Patches</uri>
<uri link="">CVE-2005-2794</uri>
<uri link="">CVE-2005-2796</uri>
<metadata tag="submitter" timestamp="Mon, 05 Sep 2005 08:24:13 +0000">
<metadata tag="bugReady" timestamp="Mon, 05 Sep 2005 08:39:15 +0000">