Mandrake Linux Security Advisory : squid (MDKSA-2002:016-1)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.

Synopsis :

The remote Mandrake Linux host is missing a security update.

Description :

Three security issues were found in the 2.x versions of the Squid
proxy server up to and including 2.4.STABLE3. The first is a memory
leak in the optional SNMP interface to Squid which could allow a
malicious user who can send packets to the Squid SNMP port to possibly
perform a Denial of Service attack on ther server if the SNMP
interface is enabled. The next is a buffer overflow in the
implementation of ftp:// URLs where allowed users could possibly
perform a DoS on the server, and may be able to trigger remote
execution of code (which the authors have not yet confirmed). The
final issue is with the HTCP interface which cannot be properly
disabled from squid.conf; HTCP is enabled by default on Mandrake Linux

Update :

The squid updates for all versions other than Mandrake Linux were
incorrectly built with LDAP authentication which introduced a
dependency on OpenLDAP. These new packages do not use LDAP
authentication. The Single Network Firewall 7.2 package previously
released did not use LDAP authentication, however rebuilding the
source RPM package required LDAP to be installed. Single Network
Firewall 7.2 users do not need to upgrade to these packages to have a
properly function squid.

See also :

Solution :

Update the affected squid package.

Risk factor :

High / CVSS Base Score : 7.5

Family: Mandriva Local Security Checks

Nessus Plugin ID: 13924 (mandrake_MDKSA-2002-016.nasl)

Bugtraq ID:

CVE ID: CVE-2002-0067

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now