FreeBSD : squid -- HTTP response splitting cache pollution attack (4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3)

This script is Copyright (C) 2005-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

According to a whitepaper published by Sanctum, Inc., it is possible
to mount cache poisoning attacks against, among others, squid proxies
by inserting false replies into the HTTP stream.

The squid patches page notes :

This patch additionally strengthens Squid from the HTTP response
attack described by Sanctum.

See also :

http://www.nessus.org/u?f0d114a4
http://bugs.squid-cache.org/show_bug.cgi?id=1200
http://www.nessus.org/u?58b0ed0c
http://www.nessus.org/u?fbc8d15b

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18930 (freebsd_pkg_4e4bd2c26bd511d99e1ec296ac722cb3.nasl)

Bugtraq ID:

CVE ID: CVE-2005-0175

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now