FreeBSD : squidGuard -- multiple vulnerabilities (692ab645-bf5d-11de-849b-00151797c2d4)

Medium Nessus Plugin ID 42213


The remote FreeBSD host is missing a security-related update.


SquidGuard website reports :

Patch 20091015 fixes one buffer overflow problem in sgLog.c when overlong URLs are requested. SquidGuard will then go into emergency mode were no blocking occurs. This is not required in this situation.

Patch 20091019 fixes two bypass problems with URLs which length is close to the limit defined by MAX_BUF (default: 4096) in squidGuard and MAX_URL (default : 4096 in squid 2.x and 8192 in squid 3.x) in squid. For this kind of URLs the proxy request exceeds MAX_BUF causing squidGuard to complain about not being able to parse the squid request. Increasing the buffer limit to be higher than the one defined in MAX_URL solves the issue.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 42213

File Name: freebsd_pkg_692ab645bf5d11de849b00151797c2d4.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2009/10/23

Modified: 2013/06/21

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:squidGuard, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2009/10/22

Vulnerability Publication Date: 2009/10/15

Reference Information

CVE: CVE-2009-3700, CVE-2009-3826

CWE: 119