RHEL 2.1 / 3 : squid (RHSA-2004:133)

High Nessus Plugin ID 12481


The remote Red Hat host is missing a security update.


An updated squid package is available that fixes a security vulnerability in URL decoding and provides a new ACL type for protecting vulnerable clients.

Squid is a full-featured Web proxy cache.

A bug was found in the processing of %-encoded characters in a URL in versions of Squid 2.5.STABLE4 and earlier. If a Squid configuration uses Access Control Lists (ACLs), a remote attacker could create URLs that would not be correctly tested against Squid's ACLs, potentially allowing clients to access prohibited URLs.

Users of Squid should update to these erratum packages which are not vulnerable to this issue.

In addition, these packages contain a new Access Control type, 'urllogin', which can be used to protect vulnerable Microsoft Internet Explorer clients from accessing URLs that contain login information.
Such URLs are often used by fraudsters to trick web users into revealing valuable personal data.

Note that the default Squid configuration does not make use of this new access control type. You must explicitly configure Squid with ACLs that use this new type, in accordance with your own site policies.


Update the affected squid package.

See Also





Plugin Details

Severity: High

ID: 12481

File Name: redhat-RHSA-2004-133.nasl

Version: $Revision: 1.19 $

Type: local

Agent: unix

Published: 2004/07/06

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:squid, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 2004/04/14

Reference Information

CVE: CVE-2004-0189

RHSA: 2004:133