First published: Tue Mar 30 2010(Updated: )
Squid is a high-performance proxy caching server for web clients,<br>supporting FTP, Gopher, and HTTP data objects.<br>A flaw was found in the way Squid processed certain external ACL helper<br>HTTP header fields that contained a delimiter that was not a comma. A<br>remote attacker could issue a crafted request to the Squid server, causing<br>excessive CPU use (up to 100%). (CVE-2009-2855)<br>Note: The CVE-2009-2855 issue only affected non-default configurations that<br>use an external ACL helper script.<br>A flaw was found in the way Squid handled truncated DNS replies. A remote<br>attacker able to send specially-crafted UDP packets to Squid's DNS client<br>port could trigger an assertion failure in Squid's child process, causing<br>that child process to exit. (CVE-2010-0308)<br>This update also fixes the following bugs:<br><li> Squid's init script returns a non-zero value when trying to stop a</li> stopped service. This is not LSB compliant and can generate difficulties in<br>cluster environments. This update makes stopping LSB compliant. (BZ#521926)<br><li> Squid is not currently built to support MAC address filtering in ACLs.</li> This update includes support for MAC address filtering. (BZ#496170)<br><li> Squid is not currently built to support Kerberos negotiate</li> authentication. This update enables Kerberos authentication. (BZ#516245)<br><li> Squid does not include the port number as part of URIs it constructs when</li> configured as an accelerator. This results in a 403 error. This update<br>corrects this behavior. (BZ#538738)<br><li> the error_map feature does not work if the same handling is set also on</li> the HTTP server that operates in deflate mode. This update fixes this<br>issue. (BZ#470843)<br>All users of squid should upgrade to this updated package, which resolves<br>these issues. After installing this update, the squid service will be<br>restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/squid | <2.6.STABLE21-6.el5 | 2.6.STABLE21-6.el5 |
redhat/squid | <2.6.STABLE21-6.el5 | 2.6.STABLE21-6.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0221 is considered important due to the potential for remote code execution.
To fix RHSA-2010:0221, upgrade the Squid package to version 2.6.STABLE21-6.el5 or later.
Affected versions of Squid include all versions prior to 2.6.STABLE21-6.el5.
Yes, RHSA-2010:0221 can be exploited remotely by attackers targeting the Squid proxy server.
RHSA-2010:0221 addresses a flaw in Squid's handling of certain HTTP header fields leading to potential security risks.