icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Squid NTLM Authentication NTLMSSP Packet Remote DoS

Medium

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote server is running a Squid proxy server. This version is reported vulnerable to a remote denial of service in the NTLM authentication routine. If NTLM authentication is enabled, an attacker may deny service to legitimate users by sending malformed NTLMSSP packets.

Solution

Apply the relevant patch from http://www.squid-cache.org/squid/Versions/v2/2.5/bugs/squid-2.5.STABLE6-ntlm_fetch_string.patch