This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200403-11
(Squid ACL [url_regex] bypass vulnerability)
A bug in Squid allows users to bypass certain access controls by passing a
URL containing '%00' which exploits the Squid decoding function.
This may insert a NUL character into decoded URLs, which may allow users to
bypass url_regex access control lists that are enforced upon them.
In such a scenario, Squid will insert a NUL character after
the'%00' and it will make a comparison between the URL to the end
of the NUL character rather than the contents after it: the comparison does
not result in a match, and the user's request is not denied.
Restricted users may be able to bypass url_regex access control lists that
are enforced upon them which may cause unwanted network traffic as well as
a route for other possible exploits. Users of Squid 2.5STABLE4 and below
who require the url_regex features are recommended to upgrade to 2.5STABLE5
to maintain the security of their infrastructure.
A workaround is not currently known for this issue. All users are advised
to upgrade to the latest version of Squid.
See also :
Squid can be updated as follows:
# emerge sync
# emerge -pv '>=net-proxy/squid-2.5.5'
# emerge '>=net-proxy/squid-2.5.5'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 14462 (gentoo_GLSA-200403-11.nasl)
CVE ID: CVE-2004-0189
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.