FreeBSD : squid -- buffer overflow vulnerability in gopherToHTML (184ab9e0-64cd-11d9-9e1e-c296ac722cb3)

medium Nessus Plugin ID 18851

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

The squid patches page notes :

A malicious gopher server may return a response with very long lines that cause a buffer overflow in Squid.

Workaround: Since gopher is very obscure these days, do not allow Squid to any gopher servers. Use an ACL rule like : acl Gopher proto gopher http_access deny Gopher

Solution

Update the affected package.

See Also

http://www.nessus.org/u?ddee9a7f

https://bugs.squid-cache.org/show_bug.cgi?id=1189

http://www.squid-cache.org/Advisories/SQUID-2005_1.txt

http://www.nessus.org/u?4f9cd695

Plugin Details

Severity: Medium

ID: 18851

File Name: freebsd_pkg_184ab9e064cd11d99e1ec296ac722cb3.nasl

Version: 1.17

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:squid, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 1/12/2005

Vulnerability Publication Date: 1/11/2005

Reference Information

CVE: CVE-2005-0094