This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.
The remote Mandrake Linux host is missing a security update.
Squid 2.5, when processing the configuration file, parses empty Access
Control Lists (ACLs), including proxy_auth ACLs without defined auth
schemes, in a way that effectively removes arguments, which could
allow remote attackers to bypass intended ACLs if the administrator
ignores the parser warnings. (CVE-2005-0194)
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the
Netscape Set-Cookie recommendations for handling cookies in caches,
may cause Set-Cookie headers to be sent to other users, which allows
attackers to steal the related cookies. (CVE-2005-0626)
Squid 2.5.STABLE7 and earlier allows remote attackers to cause a
denial of service (segmentation fault) by aborting the connection
during a (1) PUT or (2) POST request, which causes Squid to access
previosuly freed memory. (CVE-2005-0718)
A bug in the way Squid processes errors in the access control list was
also found. It is possible that an error in the access control list
could give users more access than intended. (CVE-2005-1345)
In addition, due to subtle bugs in the previous backported updates of
squid (Bugzilla #14209), all the squid-2.5 versions have been updated
to squid-2.5.STABLE9 with all the STABLE9 patches from the squid
The updated packages are patched to fix these problems.
Update the affected squid package.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Mandriva Local Security Checks
Nessus Plugin ID: 18171 (mandrake_MDKSA-2005-078.nasl)
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now