This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200502-04
(Squid: Multiple vulnerabilities)
Squid contains several vulnerabilities:
Buffer overflow when handling WCCP recvfrom()
Loose checking of HTTP headers (CAN-2005-0173 and
Incorrect handling of LDAP login names with spaces
An attacker could exploit:
the WCCP buffer overflow to cause Denial of Service.
the HTTP header parsing vulnerabilities to inject arbitrary
response data, potentially leading to content spoofing, web cache
poisoning and other cross-site scripting or HTTP response splitting
the LDAP issue to login with several variations of the same login
name, leading to log poisoning.
There is no known workaround at this time.
See also :
All Squid users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-proxy/squid-2.5.7-r5'
Risk factor :
High / CVSS Base Score : 7.5
Family: Gentoo Local Security Checks
Nessus Plugin ID: 16441 (gentoo_GLSA-200502-04.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now