SuSE: 2004-016: squid Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: squid
Announcement-ID: SuSE-SA:2004:016
Date: Wednesday, Jun 9th 2004 16:30 MEST
Affected products: 8.2, 9.0, 9.1
Vulnerability Type: remote system compromise
Severity (1-10): 5
SUSE default package: no
Cross References: CAN-2004-0541
Content of this advisory:
1) security vulnerability resolved:
- buffer overflow
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- icecast
- sitecopy
- cadaver
- tla
- OpenOffice_org
- tripwire
- postgresql
- lha
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Squid is a feature-rich web-proxy with support for various web-related
protocols.
The NTLM authentication helper application of Squid is vulnerable to
a buffer overflow that can be exploited remotely by using a long
password to execute arbitrary code.
NTLM authentication is enabled by default in the Squid package that
is shipped by SUSE LINUX.
There is no workaround known other then turning off the NTLM
authentication.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-9.1:
ea3da461f226cc881562b06224a8370e
patch rpm(s):
f85bd7c071695d0d9c304969c5a35a23
source rpm(s):
610caf4de1d7333af0f8613767d40bb0
SuSE-9.0:
fc31dd7379b249d8f9a07d0f4464996d
patch rpm(s):
06961779c39bca33ee2d619773f47f39
source rpm(s):
90c171552d03e2efb731d25a4ffbf553
SuSE-8.2:
d35da0a2719ca8de24c299ef9a8dbe3f
patch rpm(s):
0aa98cf95a23a0ea35a2e6657717243e
source rpm(s):
4fdd84cebf8dbdc7334e48a9f8369efc
SuSE-8.0:
fa4780901f96712ea22eef28bdf53700
patch rpm(s):
917c26da9c444085d045b708548eae3e
source rpm(s):
dc96baf5541829ee6e615861d17146aa
Opteron x86_64 Platform:
SuSE-9.1:
868c4121e1622f6ac91a8eaac414eabe
patch rpm(s):
0cbc28a5262dfe4eb72ee3fbbb5b4657
source rpm(s):
20ab0af37af2139e1de8f1f4edfcc2c6
SuSE-9.0:
616f32f8196ed53a4f5f163f33d2a838
patch rpm(s):
72ca1d31e833be4d9e9c150349d2bbbc
source rpm(s):
632bd7bdbe116eff14213b9f6245cd0a
______________________________________________________________________________
2) Pending vulnerabilities in SUSE Distributions and Workarounds:
- icecast
The icecast service is vulnerable to a remote denial-of-service
attack. Update packages will be available soon.
- sitecopy
The sitecopy package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- cadaver
The cadaver package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages will be
available soon.
- tla
The tla package includes a vulnerable version of the
neon library (CAN-2004-0179, CAN-2004-0398). Update packages are
available on our FTP servers.
- OpenOffice_org
The OpenOffice_org package includes a vulnerable version
of the neon library (CAN-2004-0179, CAN-2004-0398). Update packages
will be available soon.
- tripwire
A format string bug in tripwire can be exploited locally
to gain root permissions. Update packages will be available soon.
- postgresql
A buffer overflow in psqlODBC could be exploited to crash the
application using it. E.g. a PHP script that uses ODBC to access a
PostgreSQL database can be utilized to crash the surrounding Apache
web-server. Other parts of PostgreSQL are not affected.
Update packages will be available soon.
- lha
Minor security fix for a buffer overflow while handling command
line options. This buffer overflow could be exploited in conjunction
with other mechanisms to gain higher privileges or access the system
remotely.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References