Squid ntlm_check_auth Function NTLM Authentication Helper Password Handling Remote Overflow

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.


Synopsis :

The remote service is affected by a remote code execution
vulnerability.

Description :

The remote server is affected by a remote code execution vulnerability
in the Squid Internet Object Cache server due to a failure to test the
length of the user-supplied LanMan hash value in the ntlm_check_auth()
function in libntlmssp.c. An unauthenticated, remote attacker can
exploit this, via a specially crafted request, to cause a stack-based
buffer overflow, resulting in the execution of arbitrary code.

Note that Squid 2.5*-STABLE and 3.*-PRE are reportedly vulnerable.

See also :

http://www.nessus.org/u?7990c203

Solution :

Apply the relevant patch or upgrade to the latest version.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 12294 ()

Bugtraq ID: 10500

CVE ID: CVE-2004-0541

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now