Squid ntlm_check_auth Function NTLM Authentication Helper Password Handling Remote Overflow

This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.

Synopsis :

The remote service is affected by a remote code execution

Description :

The remote server is affected by a remote code execution vulnerability
in the Squid Internet Object Cache server due to a failure to test the
length of the user-supplied LanMan hash value in the ntlm_check_auth()
function in libntlmssp.c. An unauthenticated, remote attacker can
exploit this, via a specially crafted request, to cause a stack-based
buffer overflow, resulting in the execution of arbitrary code.

Note that Squid 2.5*-STABLE and 3.*-PRE are reportedly vulnerable.

See also :


Solution :

Apply the relevant patch or upgrade to the latest version.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: Firewalls

Nessus Plugin ID: 12294 ()

Bugtraq ID: 10500

CVE ID: CVE-2004-0541

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now