Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 261210 (CVE-2009-0804) - <=net-proxy/ziproxy-2.6.0 access control bypass (CVE-2009-0804)
Summary: <=net-proxy/ziproxy-2.6.0 access control bypass (CVE-2009-0804)
Status: RESOLVED FIXED
Alias: CVE-2009-0804
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://www.kb.cert.org/vuls/id/435052
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2009-03-04 18:48 UTC by Stefan Behte (RETIRED)
Modified: 2009-03-06 19:47 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Behte (RETIRED) gentoo-dev Security 2009-03-04 18:48:07 UTC
CVE-2009-0804 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-0804):
  Ziproxy 2.6.0, when transparent interception mode is enabled, uses
  the HTTP Host header to determine the remote endpoint, which allows
  remote attackers to bypass access controls for Flash, Java,
  Silverlight, and probably other technologies, and possibly
  communicate with restricted intranet sites, via a crafted web page
  that causes a client to send HTTP requests with a modified Host
  header.
Comment 1 Stefan Behte (RETIRED) gentoo-dev Security 2009-03-04 18:49:45 UTC
http://ziproxy.sourceforge.net/ says:

Ziproxy 2.6.9_BETA released.

"Added provision for outgoing port restrictions.
New options: RestrictOutPortHTTP, RestrictOutPortCONNECT
This provision mitigates the transparent proxy vulnerability US-CERT VU#435052"

Should we stable the beta or wait for the next stable release?
Comment 2 Alin Năstac (RETIRED) gentoo-dev 2009-03-06 19:39:22 UTC
I've submitted ziproxy-2.6.9_beta to the tree. 
All supported arches have testing keywords, so there is no need to involve arch teams in this.
Comment 3 Alex Legler (RETIRED) archtester gentoo-dev Security 2009-03-06 19:47:08 UTC
Looks like testing-only indeed. Closing.