Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 63871 - www-proxy/squid: buffer overflow can possible cause DoS
Summary: www-proxy/squid: buffer overflow can possible cause DoS
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.squid-cache.org/bugs/show_...
Whiteboard: ?
Keywords:
Depends on:
Blocks:
 
Reported: 2004-09-13 03:15 UTC by Matthias Geerdsen (RETIRED)
Modified: 2011-10-30 22:38 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-13 03:15:10 UTC
This [1] was supposed to be fixed in Squid 2.5STABLE6, but Squid is said [2] to be still vulnerable.
I haven't seen any confirmation about this yet, but SecurityTracker as well as German Heise News have reported it.

[1] http://www.squid-cache.org/bugs/show_bug.cgi?id=972
[2] http://www.rootthief.com/?view=advisories/squid :

==========================================
Squid-Cache Buffer Overflow Vulnerablility
==========================================
Dicovered by- d3thStaR [!SUI] 
Greets: !SUI Crew, Atomix, mGrD, e0r, rootthief.com.
Sources:  Bug #972
Confirmed products effected- squid-2.5.STABLE6 and earlier
 
=======Description of Problem=======
The function clientAbortBody can cause a segmentation fault.
 
if (!conn->body.callback || conn->body.request != request)
return;
buf = conn->body.buf;
 
This was a problem supposed to be address in STABLE5 by changing:
 
 
if (!conn->body.callback || conn->body.request != request)
to
if (conn == NULL || !conn->body.callback || conn->body.request != request)
 
The problem still exists and still can crash the program.
[...]
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-13 05:59:58 UTC
also SA12508:
http://secunia.com/advisories/12508/

"A patch has been applied to version 2.5.STABLE5 and 2.5.STABLE6. However, it may reportedly only address the issue partially."
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2004-09-16 01:23:50 UTC
Still no confirmation upstream.
Comment 3 Luke Macken (RETIRED) gentoo-dev 2004-09-27 21:25:57 UTC
The claim that Squid 2.5STABLE6 was still vulnerable is false.
"d3thStaR" (the person who claimed this), responded below:

------- Additional Comment #15 From d3thStaR 2004-09-27 20:30 -------

I am very sorry... I didn't even realize that people were still looking for an 
answer with this...

I'm fairly embarrassed with all of this, but the release I thought was STABLE6 
was a mis-labled version of Stable5...

I appologize for the inconvinience..