RHEL 2.1 / 3 : squid (RHSA-2004:133)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing a security update.

Description :

An updated squid package is available that fixes a security
vulnerability in URL decoding and provides a new ACL type for
protecting vulnerable clients.

Squid is a full-featured Web proxy cache.

A bug was found in the processing of %-encoded characters in a URL in
versions of Squid 2.5.STABLE4 and earlier. If a Squid configuration
uses Access Control Lists (ACLs), a remote attacker could create URLs
that would not be correctly tested against Squid's ACLs, potentially
allowing clients to access prohibited URLs.

Users of Squid should update to these erratum packages which are not
vulnerable to this issue.

In addition, these packages contain a new Access Control type,
'urllogin', which can be used to protect vulnerable Microsoft Internet
Explorer clients from accessing URLs that contain login information.
Such URLs are often used by fraudsters to trick web users into
revealing valuable personal data.

Note that the default Squid configuration does not make use of this
new access control type. You must explicitly configure Squid with ACLs
that use this new type, in accordance with your own site policies.

See also :

https://www.redhat.com/security/data/cve/CVE-2004-0189.html
http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
http://www.microsoft.com/security/incident/spoof.asp
http://rhn.redhat.com/errata/RHSA-2004-133.html

Solution :

Update the affected squid package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Red Hat Local Security Checks

Nessus Plugin ID: 12481 ()

Bugtraq ID:

CVE ID: CVE-2004-0189