Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Squid Vendors:   [Multiple Authors/Vendors]
(Debian Issues Fix) Squid Proxy Caching Server Can Be Crashed by Remote Users with Mkdir PUT Requests
SecurityTracker Alert ID:  1002451
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Sep 26 2001
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.3 and 2.4 series
Description:   A denial of service vulnerability was reported in the Squid proxy caching server. A remote user can cause the proxy caching service to crash.

The following type of request that requires a directory to be created will cause the Squid proxy to crash:

PUT ftp://cgi-lexus:yGDgX9@[ftpserveraddress]/WEB-INF/1/2/1/ HTTP/1.1

The following log messages will be created as a result of this type of command:

Sep 10 14:17:11 azimuth (squid): xstrdup: tried to dup a NULL pointer!
Sep 10 14:17:11 azimuth squid[3027]: Squid Parent: child process 12742 exited due to signal 6
Sep 10 14:17:14 azimuth squid[3027]: Squid Parent: child process 12745 started

It is reported that the process will reload within a few seconds and return to normal operation.

Impact:   A remote user can cause the Squid proxy to crash.
Solution:   The vendor has released a fix in version 2.2.5-3.2. See the Source Message for the vendor's advisory containing directions on how to obtain the appropriate fix.
Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Debian)
Underlying OS Comments:  Tested on RedHat 6.2 and 7.1.

Message History:   This archive entry is a follow-up to the message listed below.
Sep 21 2001 Squid Proxy Caching Server Can Be Crashed by Remote Users with Mkdir PUT Requests

 Source Message Contents

Subject:  [SECURITY] [DSA-077-1] squid FTP PUT problem


- ------------------------------------------------------------------------
Debian Security Advisory DSA-077-1                                  Wichert Akkerman
September 24, 2001
- ------------------------------------------------------------------------

Package        : squid
Problem type   : remote DoS
Debian-specific: no

Vladimir Ivaschenko found a problem in squid (a popular proxy cache).
He discovered that there was a flaw in the code to handle FTP PUT
commands: when a mkdir-only request was done squid would detect
an internal error and exit. Since squid is configured to restart
itself on problems this is not a big problem.

This has been fixed in version 2.2.5-3.2. This problem is logged
as bug 233 in the squid bugtracker and will also be fixed in
future squid releases.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
      MD5 checksum: 313ec322ee2f0a1ada034b663e3c1900
      MD5 checksum: b5bee93a16b453ddfcfcba47ff890e15
      MD5 checksum: 3ae40a4f21b110553446fe3d92ed2bda

  Alpha architecture:
      MD5 checksum: fae45705a7ee232f8d03b4732a12df63
      MD5 checksum: eadbb969803ff90c5dcdc303045d62ea
      MD5 checksum: 30928ec74d7e99c6153e2955d9cd1ab6

  ARM architecture:
      MD5 checksum: 7a35d908fa1d2388085a0298701bee04
      MD5 checksum: e4370d9686faf2e9b60c2014fb912255
      MD5 checksum: 3e14d433f3032c5b1877591aa6fb9b83

  Intel IA-32 architecture:
      MD5 checksum: 1e13385cb135b8b887055b8de6122b28
      MD5 checksum: edaf764ff5b74e852385668f72d9f637
      MD5 checksum: e5c24bec77c9dcaf4025dce215821bc3

  Motorola 680x0 architecture:
      MD5 checksum: 3585d677749848a5137cd28047c3279c
      MD5 checksum: 62d419bafd69b29dce27726ee7abee40
      MD5 checksum: a3008be51bf14268e155230c194e2281

  PowerPC architecture:
      MD5 checksum: 76c77d85a764797fc89f1b0112a141e9
      MD5 checksum: 9170efeb0e7507aa0e2757877aee2b7b
      MD5 checksum: 3b0aa78c0eab2e27e09aa10f8972aa25

  Sun Sparc architecture:
      MD5 checksum: 3d072245558b082c58b7446af5bedeba
      MD5 checksum: 40cb9da4742bfd4cd1c11536a360f384
      MD5 checksum: b77a77b1f119cf3b371bd9a87f3ebd6a

  These packages will be moved into the stable distribution on its next

For not yet released architectures please refer to the appropriate
directory$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb stable/updates main
dpkg-ftp: dists/stable/updates/main
Mailing list:

Version: 2.6.3ia
Charset: noconv


To UNSUBSCRIBE, email to
with a subject of "unsubscribe". Trouble? Contact


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, LLC