Squid < 2.5.STABLE8 DoS

Medium Nessus Network Monitor Plugin ID 2520

Synopsis

The remote proxy server is vulnerable to a Denial of Service (DoS) attack.

Description

The remote Squid caching proxy, according to its version number, may be vulnerable to a remote denial of service.

This flaw is caused due to an input validation error in the NTLM module.

An attacker can exploit this flaw to crash the server with a specially crafted packet.

The remote Squid proxy is also vulnerable to a cache-corruption flaw due to incorrect parsing of malformed HTTP headers. An attacker exploiting this flaw would be able to poison the cache.

The remote Squid proxy is vulnerable to an authentication bypass
in the squid_ldap_auth module as well as a remote overflow due to oversized HTTP headers.

Solution

Upgrade to Squid 2.5.STABLE8 or higher.

See Also

http://www.squid-cache.org

http://www.squid-cache.org/Versions/v2/2.5/bugs

http://www.nessus.org/u?af6b5d37

Plugin Details

Severity: Medium

ID: 2520

File Name: 2520.prm

Family: Web Servers

Published: 2005/01/21

Modified: 2016/11/23

Dependencies: 3389

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:squid-cache:squid

Patch Publication Date: 2005/01/08

Vulnerability Publication Date: 2005/01/08

Reference Information

CVE: CVE-2005-0241, CVE-2005-0096, CVE-2005-0173, CVE-2005-0174, CVE-2005-0097, CVE-2005-0175, CVE-2005-0211

BID: 12220, 12324, 12412, 12431, 12432, 12433