Red Hat 9062 Published by

Updated Squid packages are available for Red Hat Enterprise Linux 2.1 and 3

----------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Squid package fixes security issues
Advisory ID: RHSA-2005:061-01
Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-061.html
Issue date: 2005-02-11
Updated on: 2005-02-11
Product: Red Hat Enterprise Linux
CVE Names: CAN-2005-0094 CAN-2005-0095 CAN-2005-0096 CAN-2005-0097 CAN-2005-0173 CAN-2005-0174 CAN-2005-0175 CAN-2005-0211 CAN-2005-0241
----------------------------------------------------------------------

1. Summary:

An updated Squid package that fixes several security issues is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64



3. Problem description:

Squid is a full-featured Web proxy cache.

A buffer overflow flaw was found in the Gopher relay parser. This bug could allow a remote Gopher server to crash the Squid proxy that reads data from it. Although Gopher servers are now quite rare, a malicious web page (for example) could redirect or contain a frame pointing to an attacker's malicious gopher server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0094 to this issue.

An integer overflow flaw was found in the WCCP message parser. It is possible to crash the Squid server if an attacker is able to send a malformed WCCP message with a spoofed source address matching Squid's "home router". The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0095 to this issue.

A memory leak was found in the NTLM fakeauth_auth helper. It is possible that an attacker could place the Squid server under high load, causing the NTML fakeauth_auth helper to consume a large amount of memory, resulting in a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0096 to this issue.

A NULL pointer de-reference bug was found in the NTLM fakeauth_auth helper. It is possible for an attacker to send a malformed NTLM type 3 message, causing the Squid server to crash. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0097 to this issue.

A username validation bug was found in squid_ldap_auth. It is possible for a username to be padded with spaces, which could allow a user to bypass explicit access control rules or confuse accounting. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0173 to this issue.

The way Squid handles HTTP responses was found to need strengthening. It is possible that a malicious web server could send a series of HTTP responses in such a way that the Squid cache could be poisoned, presenting users with incorrect webpages. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CAN-2005-0174 and CAN-2005-0175 to these issues.

A bug was found in the way Squid handled oversized HTTP response headers. It is possible that a malicious web server could send a specially crafted HTTP header which could cause the Squid cache to be poisoned, presenting users with incorrect webpages. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0241 to this issue.

A buffer overflow bug was found in the WCCP message parser. It is possible that an attacker could send a malformed WCCP message which could crash the Squid server or execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0211 to this issue.

Users of Squid should upgrade to this updated package, which contains backported patches, and is not vulnerable to these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/):

145540 - CAN-2005-0094 Multiple issues with squid (CAN-2005-0095 CAN-2005-0096 CAN-2005-0097)
146159 - CAN-2005-0173 Multiple squid issues (CAN-2005-0174 CAN-2005-0175)
146780 - CAN-2005-0241 Correct handling of oversized reply headers

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm

ia64:
223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

ia64:
223ad64e00405758e505b1412a83ca65 squid-2.4.STABLE7-1.21as.4.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/squid-2.4.STABLE7-1.21as.4.src.rpm
95b8c52d164e1178ca73d0f7751fe920 squid-2.4.STABLE7-1.21as.4.src.rpm

i386:
a950517eec9d75e9f9255c22098cb942 squid-2.4.STABLE7-1.21as.4.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

ppc:
eeabefd918d66aed11cfc1b28403b141 squid-2.5.STABLE3-6.3E.7.ppc.rpm

s390:
7a2b9540c7b55ee44984f796e39d806d squid-2.5.STABLE3-6.3E.7.s390.rpm

s390x:
372366d5fbaa404527a43e9de8f46cdd squid-2.5.STABLE3-6.3E.7.s390x.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/squid-2.5.STABLE3-6.3E.7.src.rpm
d8641aa493868a48143ff7ad71fb515a squid-2.5.STABLE3-6.3E.7.src.rpm

i386:
3da9a078535a549a941c35dd4efcb07e squid-2.5.STABLE3-6.3E.7.i386.rpm

ia64:
44ba7d01ebfde6643bbca67ed612f71e squid-2.5.STABLE3-6.3E.7.ia64.rpm

x86_64:
cd4a5c1528339547803f7784a494ef61 squid-2.5.STABLE3-6.3E.7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package

7. References:

http://www.squid-cache.org/Advisories/SQUID-2005_1.txt
http://www.squid-cache.org/Advisories/SQUID-2005_2.txt
http://www.squid-cache.org/Advisories/SQUID-2005_3.txt
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-fakeauth_auth
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-ldap_spaces
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0096
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0241

8. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact/

Copyright 2005 Red Hat, Inc.