SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Squid Vendors:   [Multiple Authors/Vendors]
(Debian Issues Fix) Squid Proxy Caching Server Can Be Crashed by Remote Users with Mkdir PUT Requests
SecurityTracker Alert ID:  1002451
SecurityTracker URL:  http://securitytracker.com/id/1002451
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 26 2001
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.3 and 2.4 series
Description:   A denial of service vulnerability was reported in the Squid proxy caching server. A remote user can cause the proxy caching service to crash.

The following type of request that requires a directory to be created will cause the Squid proxy to crash:

PUT ftp://cgi-lexus:yGDgX9@[ftpserveraddress]/WEB-INF/1/2/1/ HTTP/1.1

The following log messages will be created as a result of this type of command:

Sep 10 14:17:11 azimuth (squid): xstrdup: tried to dup a NULL pointer!
Sep 10 14:17:11 azimuth squid[3027]: Squid Parent: child process 12742 exited due to signal 6
Sep 10 14:17:14 azimuth squid[3027]: Squid Parent: child process 12745 started

It is reported that the process will reload within a few seconds and return to normal operation.

Impact:   A remote user can cause the Squid proxy to crash.
Solution:   The vendor has released a fix in version 2.2.5-3.2. See the Source Message for the vendor's advisory containing directions on how to obtain the appropriate fix.
Vendor URL:  www.squid-cache.org/bugs/show_bug.cgi?id=233 (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Debian)
Underlying OS Comments:  Tested on RedHat 6.2 and 7.1.

Message History:   This archive entry is a follow-up to the message listed below.
Sep 21 2001 Squid Proxy Caching Server Can Be Crashed by Remote Users with Mkdir PUT Requests



 Source Message Contents

Subject:  [SECURITY] [DSA-077-1] squid FTP PUT problem


-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-077-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
September 24, 2001
- ------------------------------------------------------------------------


Package        : squid
Problem type   : remote DoS
Debian-specific: no

Vladimir Ivaschenko found a problem in squid (a popular proxy cache).
He discovered that there was a flaw in the code to handle FTP PUT
commands: when a mkdir-only request was done squid would detect
an internal error and exit. Since squid is configured to restart
itself on problems this is not a big problem.

This has been fixed in version 2.2.5-3.2. This problem is logged
as bug 233 in the squid bugtracker and will also be fixed in
future squid releases.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5-3.2.diff.gz
      MD5 checksum: 313ec322ee2f0a1ada034b663e3c1900
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5-3.2.dsc
      MD5 checksum: b5bee93a16b453ddfcfcba47ff890e15
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5.orig.tar.gz
      MD5 checksum: 3ae40a4f21b110553446fe3d92ed2bda

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squid-cgi_2.2.5-3.2_alpha.deb
      MD5 checksum: fae45705a7ee232f8d03b4732a12df63
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squid_2.2.5-3.2_alpha.deb
      MD5 checksum: eadbb969803ff90c5dcdc303045d62ea
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squidclient_2.2.5-3.2_alpha.deb
      MD5 checksum: 30928ec74d7e99c6153e2955d9cd1ab6

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/squid-cgi_2.2.5-3.2_arm.deb
      MD5 checksum: 7a35d908fa1d2388085a0298701bee04
    http://security.debian.org/dists/stable/updates/main/binary-arm/squid_2.2.5-3.2_arm.deb
      MD5 checksum: e4370d9686faf2e9b60c2014fb912255
    http://security.debian.org/dists/stable/updates/main/binary-arm/squidclient_2.2.5-3.2_arm.deb
      MD5 checksum: 3e14d433f3032c5b1877591aa6fb9b83

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/squid-cgi_2.2.5-3.2_i386.deb
      MD5 checksum: 1e13385cb135b8b887055b8de6122b28
    http://security.debian.org/dists/stable/updates/main/binary-i386/squid_2.2.5-3.2_i386.deb
      MD5 checksum: edaf764ff5b74e852385668f72d9f637
    http://security.debian.org/dists/stable/updates/main/binary-i386/squidclient_2.2.5-3.2_i386.deb
      MD5 checksum: e5c24bec77c9dcaf4025dce215821bc3

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squid-cgi_2.2.5-3.2_m68k.deb
      MD5 checksum: 3585d677749848a5137cd28047c3279c
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squid_2.2.5-3.2_m68k.deb
      MD5 checksum: 62d419bafd69b29dce27726ee7abee40
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squidclient_2.2.5-3.2_m68k.deb
      MD5 checksum: a3008be51bf14268e155230c194e2281

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squid-cgi_2.2.5-3.2_powerpc.deb
      MD5 checksum: 76c77d85a764797fc89f1b0112a141e9
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squid_2.2.5-3.2_powerpc.deb
      MD5 checksum: 9170efeb0e7507aa0e2757877aee2b7b
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squidclient_2.2.5-3.2_powerpc.deb
      MD5 checksum: 3b0aa78c0eab2e27e09aa10f8972aa25

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squid-cgi_2.2.5-3.2_sparc.deb
      MD5 checksum: 3d072245558b082c58b7446af5bedeba
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squid_2.2.5-3.2_sparc.deb
      MD5 checksum: 40cb9da4742bfd4cd1c11536a360f384
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squidclient_2.2.5-3.2_sparc.deb
      MD5 checksum: b77a77b1f119cf3b371bd9a87f3ebd6a

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBO651uqjZR/ntlUftAQFckQMAk7DIkzej1jKv6IE22YhhAm2m+xk1Bp3s
/yJ02CCH/z60re5UGcX1s2LP2EKRJ9PZAgP3Lqa/IO+i5Hs0M1YzS2MOVsW7oeHm
cU91omR5ENhHFSqMRtWoyNRkDalN7Dg0
=f4ul
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC