Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0069 -- Debian Security Advisory DSA 651-1 New squid packages fix denial of service 21 January 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Squid 2.5.STABLE7 and prior Publisher: Debian Operating System: Debian GNU/Linux 3.0 Linux variants Impact: Denial of Service CVE Names: CAN-2005-0095 CAN-2005-0094 Original Bulletin: http://www.debian.org/security/2005/dsa-651 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 651-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 20th, 2005 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : squid Vulnerability : buffer overflow, integer overflow Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-0094 CAN-2005-0095 Several vulnerabilities have been discovered in Squid, the internet object cache, the popular WWW proxy cache. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities: CAN-2005-0094 "infamous41md" discovered a buffer overflow in the parser for Gopher responses which will lead to memory corruption and usually crash Squid. CAN-2005-0095 "infamous41md" discovered an integer overflow in the receiver of WCCP (Web Cache Communication Protocol) messages. An attacker could send a specially crafted UDP datagram that will cause Squid to crash. For the stable distribution (woody) these problems have been fixed in version 2.4.6-2woody5. For the unstable distribution (sid) these problems have been fixed in version 2.5.7-4. We recommend that you upgrade your squid package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5.dsc Size/MD5 checksum: 612 69bd41324bb88cc4a76fcacba1f6cb9b http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5.diff.gz Size/MD5 checksum: 227846 52f6d82e486f23dba4240260dc64ea57 http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6.orig.tar.gz Size/MD5 checksum: 1081920 59ce2c58da189626d77e27b9702ca228 Alpha architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_alpha.deb Size/MD5 checksum: 814804 684a7a602a7dce53d3e2d5ea526cdfeb http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_alpha.deb Size/MD5 checksum: 75340 061412b8ca998b1ae5a7c576eac51425 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_alpha.deb Size/MD5 checksum: 60094 8ecf3345226d4023c661cb5950929d5c ARM architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_arm.deb Size/MD5 checksum: 725286 b9103ba40dfcc47200b971a0ad123bb9 http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_arm.deb Size/MD5 checksum: 73116 fe083c2e4e65e0bcff82b42c292f9c69 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_arm.deb Size/MD5 checksum: 58444 225728ea1d83a4f999cbcd1cbc918471 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_i386.deb Size/MD5 checksum: 684376 bd4f50309316282ffdf9012e6a051349 http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_i386.deb Size/MD5 checksum: 72850 f0f790e828a53ae94406c68d8c386ac7 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_i386.deb Size/MD5 checksum: 58014 9f2e5d189aa0df9d01d47c6870ca25f9 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_ia64.deb Size/MD5 checksum: 953366 146cb3cfadbb09b473289462fcb85c4e http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_ia64.deb Size/MD5 checksum: 79224 6a83889272e28d86602d86358929196b http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_ia64.deb Size/MD5 checksum: 62766 6b48ca53c8bc2f0972a1b4653d04fa54 HP Precision architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_hppa.deb Size/MD5 checksum: 779204 684c9f7e7b7bd4abda5eda0890974951 http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_hppa.deb Size/MD5 checksum: 74562 861f28d3d058c56d620ce557b488780f http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_hppa.deb Size/MD5 checksum: 59574 16d03b269cb3d067cd6129b9bf1eccdc Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_m68k.deb Size/MD5 checksum: 665532 da4701e4506c91a7297ebe41314d88cd http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_m68k.deb Size/MD5 checksum: 72460 3ad96b1dc107bbaafd67592f8477bab4 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_m68k.deb Size/MD5 checksum: 57678 0202dafa52ea24eb34c3d477459ad287 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_mips.deb Size/MD5 checksum: 764854 c97c148f54c9d80e9d3d6c127894813b http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_mips.deb Size/MD5 checksum: 74028 d49e9634ed353d8b713f4d80de731b61 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_mips.deb Size/MD5 checksum: 58730 762b4bb651f8531208db4cd941a06560 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_mipsel.deb Size/MD5 checksum: 764702 d134fdcf4916a521147f94837e2e544e http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_mipsel.deb Size/MD5 checksum: 74118 9bdfc6bc5e7f752df213cdffb197f877 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_mipsel.deb Size/MD5 checksum: 58838 edc757de19a59274fcb2a3d32791dcc0 PowerPC architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_powerpc.deb Size/MD5 checksum: 722068 9c18747e4a7e6b15c05ab547efc59993 http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_powerpc.deb Size/MD5 checksum: 73100 7af618b2b8b1e225af2631a07da615d8 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_powerpc.deb Size/MD5 checksum: 58322 23f79cf266df794a375ba75b2a973026 IBM S/390 architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_s390.deb Size/MD5 checksum: 711584 f750ce9dd12460574b2c69031d3933bf http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_s390.deb Size/MD5 checksum: 73442 e9a485219baaec097b7d432ba4ea8a26 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_s390.deb Size/MD5 checksum: 58876 4ab64ae10b353e69facfcc59fa6fa0ab Sun Sparc architecture: http://security.debian.org/pool/updates/main/s/squid/squid_2.4.6-2woody5_sparc.deb Size/MD5 checksum: 724314 d4af1a337ee603d7b1039f132996b0bf http://security.debian.org/pool/updates/main/s/squid/squid-cgi_2.4.6-2woody5_sparc.deb Size/MD5 checksum: 75728 9974f32b84edb4969c9216742e9c9f73 http://security.debian.org/pool/updates/main/s/squid/squidclient_2.4.6-2woody5_sparc.deb Size/MD5 checksum: 60762 a7aad73eabef840dd648ef058dc852d5 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFB7+UcW5ql+IAeqTIRAo+aAJwKdAQ/YxftQ5ERX3Du8dM3T364KQCfcSQH blvaz7fbg6rkM9Hj0TopuLM= =Kbp2 - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQfBgZSh9+71yA2DNAQIAyAP8D4Tcs9qPKSbg1bH8/vTtd+C8OczhUChi uR4HiNMImggnba3jXIPVycAQXVZVUfYTdlZ+c+D2Xtcoegl5jAtM2WH1IRgUY677 oeE+Ot6dguW1YwmlvtYHA8b03l5DlajZ5PnEALMmqNJO2aL3t1ZQdWmTTLnVsaYE W3+FHgBTwO8= =qb8J -----END PGP SIGNATURE-----