SuSE: 'squid' Multiple vulnerabilities
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: squid
Announcement-ID: SuSE-SA:2002:008
Date: Mon Mar 5 13:00:00 CET 2002
Affected SuSE products: 6.4, 7.0, 7.1, 7.2, 7.3,
Enterprise Server 7
Vulnerability Type: remote command execution
Severity (1-10): 6
SuSE default package: no
Other affected systems: all systems running vulnerable squid
Content of this advisory:
1) security vulnerability resolved: Heap overflow in squid.
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The widely used proxy-server squid contains a heap overflow in one of its
URL constructing functions. Incorrect length-calculations for the user and
passwd fields in ftp-URLs turned out to be the origin of the problem. Only
users from hosts listed in squids ACL-files could trigger the overflow.
The ftp-URL problem is not present in the 6.4, 7.0 and 7.1 distributions,
but other security releated bugs have been fixed there.
A complete history can be found at
Squid-2.4 Patches
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update. For users of our SLES-based products, please use the yast
online update.
For the updates to take effect, invoke the following command as root:
/etc/rc.d/squid restart
If you added the htcp_port directive to your squid configuration file
you might now see a warning in the logs about that directive being
unrecognized. While this does not prevent squid from starting, you can
safely remove the directive from squid.conf since HTCP support is
disabled now.
Please note that there are two binary and two source packages for almost
every distribution available.
i386 Intel Platform:
SuSE-7.3
4b1cff53fddcaf8930ec6738c6763a94
4ca7f3594ec82b703c6c36c08fb46ecb
source rpm:
3751569a6c0ea21057d37cb7d3ca9076
99f33e8d1e5b8a3e8d7f6501d26c6e67
SuSE-7.2
1f098dcb1020df788cc912d88f14bb96
cc136eeaf6ed4ac305e93d306e6f7461
source rpm:
d3fae41b9128f73a0e457376bfb7a5c1
c24bf7c45b227b06ae1013dd6fcb9d92
SuSE-7.1
5a7b26c99855837331e2d375901a5fce
f3a4a2e8d9fa4b56948e8a8d2bc6e2a0
source rpm:
6c208e3f13da8d93fecfdca62c98f46f
ad588c92719bffbc02e72fddf6195dd2
SuSE-7.0
f12ae33fd707f4ea86a48a77f48fafc8
069c07843355ee473b8b4e10b6726455
source rpm:
5a2a5f0511cfd75f736ef485bcf6e5a1
d4bc56dc9240f5ab9582b746c5c18803
SuSE-6.4
13a3e9a366d3e09ee6dcc91148c86be7
53b7ab8cfad2f14b211e1d505d721558
source rpm:
a9b0af504703aa7deeb2e0f6b7b0f512
fbe64c6fbe15e4a9d06847089bb65d13
Sparc Platform:
SuSE-7.3
99bf4711c8e781622fd3aba55f21ae5a
source rpm:
d56d66c2fd92efa157b98efb1bf6a0c6
SuSE-7.1
f6948f9862addc8d6805311b5760c95a
e6e9bf05539791905710ffb23fbd4801
source rpm:
1ad2798d085326317590e0fb42346fa9
1332572acea60f0c6ca1593fcd245771
SuSE-7.0
1958de7d7f90d27c87e1dc1b21879736
a54038090e73a78a6f3cc77e1162e4a2
source rpm:
3a398a096c2657059a093dcf58222e35
7e1483d0b41f48ef3aa00e058b0e761f
AXP Alpha Platform:
SuSE-7.1
7f39d3a0ff45f231713c6ba5afbdcc15
5fe79d7f9c2da83222978f75e3387e49
source rpm:
705a5b370267d8d873f1e3504bcc55ed
e42367f3ad73250ec9feda4687b406d2
SuSE-7.0
b0977f9c5ed0750b12308d072da1b285
3906c0d918c745582a25fb1c480d3aef
source rpm:
2afd7d60f6da4feb346ddfefc8bec34a
cab334bf697df713d847ae8c569b7b30
SuSE-6.4
1bc4ac5b27e3cfd62766d0258f91090a
b809b2523881fbea1f77f3f5b96879c5
source rpm:
7d6d942bc8b4208fe610f714868009d8
515cb7434886540fae57c5ac56acbb42
PPC Power PC Platform:
SuSE-7.3
2a14453696ced035fb21d272f7619a5c
ceda7a8a291d8b3d01127b4e0fb1ccb2
source rpm:
5427dd36485bdfb0d67060c9bad62127
a572e3f76e68a3577e6a4efe0ec016ae
SuSE-7.1
a8e274378dc15aab4ca01760c112b770
133528338cb5253a12132e3e9ec2ee2e
source rpm:
515cb7e5f04cd5980463a8b3f248e08e
b923a7141e0fb4b1f3b6e6d0185cb4aa
SuSE-7.0
2b301c87d0d2e1546cb6a63427dc9cea
20eef813e618d3ac3e8e24abcaca894c
source rpm:
7d41eaa9985c49cec7afb76dd29355e7
11bb4cb51a8abf8ebe994dc08f8a7c24
SuSE-6.4
e8020a0a7153208e58f202b0655f1ce5
efd648b5575b6fce60cd7403fbb15d5a
source rpm:
521d058bc1513947642f74a121e4e98b
8c9bf3882aa81c7de4b2b920f31e4f69
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
- ucd-snmpd
The UCD snmpd contains various security releated bugs.
We are currently reviewing the code and available fixes to ensure
they all get fixed. Patches will be available as soon as possible.
It is strongly recommended to filter SNMP (TCP and UDP packets
with destination of port 161) traffic.
- hanterm/wmtv
The recently reported vulnerabilities in hanterm and wmtv do not
affect SuSE installations because they are not installed setuid
or setgid.
- cipe
We are about to prepare kernel update packages that fix a DoS
problem in the kernel modules for the cipe encrypted tunneling software.
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References