openSUSE Security Update : squidGuard (openSUSE-SU-2010:0460-1)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

Two buffer overflows in squidGard were fixed :

CVE-2009-3700: Buffer overflow in sgLog.c in squidGuard 1.3 and 1.4
allows remote attackers to cause a denial of service (application hang
or loss of blocking functionality) via a long URL with many / (slash)
characters, related to 'emergency mode.'

CVE-2009-3826: Multiple buffer overflows in squidGuard 1.4 allow
remote attackers to bypass intended URL blocking via a long URL,
related to (1) the relationship between a certain buffer size in
squidGuard and a certain buffer size in Squid and (2) a redirect URL
that contains information about the originally requested URL.

Also a logrotate mistake was fixed.

See also :

http://lists.opensuse.org/opensuse-updates/2010-08/msg00006.html
https://bugzilla.novell.com/show_bug.cgi?id=550930
https://bugzilla.novell.com/show_bug.cgi?id=625439

Solution :

Update the affected squidGuard package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: SuSE Local Security Checks

Nessus Plugin ID: 48238 ()

Bugtraq ID:

CVE ID: CVE-2009-3700
CVE-2009-3826

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now