CERTA-2005-AVI-165

Vulnerability from certfr_avis - Published: 2005-05-17 - Updated: 2005-07-11

None

Description

Squid est un serveur mandataire (proxy) pour les protocoles HTTP, HTTPS et FTP.

Une vulnérabilité dans le traitement des réponses DNS (Domain Name System) permet à un utilisateur distant mal intentionné d'associer une adresse réticulaire (URL) avec une adresse IP arbitraire.

Solution

Appliquer les mises à jour de sécurité de l'éditeur (cf. section Documentation).

Squid 2.5 et versions antérieures.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eSquid 2.5 et versions ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nSquid est un serveur mandataire (proxy) pour les protocoles HTTP, HTTPS\net FTP.\n\nUne vuln\u00e9rabilit\u00e9 dans le traitement des r\u00e9ponses DNS (Domain Name\nSystem) permet \u00e0 un utilisateur distant mal intentionn\u00e9 d\u0027associer une\nadresse r\u00e9ticulaire (URL) avec une adresse IP arbitraire.\n\n## Solution\n\nAppliquer les mises \u00e0 jour de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation).\n",
  "cves": [],
  "initial_release_date": "2005-05-17T00:00:00",
  "last_revision_date": "2005-07-11T00:00:00",
  "links": [
    {
      "title": "Annonce de s\u00e9curit\u00e9 de l\u0027\u00e9diteur du 11 mai 2005 :",
      "url": "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005-104 du 24 juin    2005 :",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:104"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD pour Squid du 19 mai 2005 :",
      "url": "http://www.vuxml.org/freebsd/"
    },
    {
      "title": "Site Internet de l\u0027\u00e9diteur :",
      "url": "http://www.squid-cache.org/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-751 du 11 juillet 2005 :",
      "url": "http://www.debian.org/security/2005/dsa-751"
    },
    {
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 Squid 2.5.Stable9 ;",
      "url": "http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE9-dns_query.patch"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:415 du 14 juin 2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-415.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 OpenBSD pour Squid du 25 mai 2005 :",
      "url": "http://www.vuxml.org/openbsd/"
    }
  ],
  "reference": "CERTA-2005-AVI-165",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-05-17T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 FreeBSD et OpenBSD.",
      "revision_date": "2005-06-03T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 RedHat RHSA-2005:415.",
      "revision_date": "2005-06-15T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2005-104.",
      "revision_date": "2005-06-27T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian DSA-751.",
      "revision_date": "2005-07-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Usurpation de nom de site"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans Squid",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Mise \u00e0 jour de s\u00e9curit\u00e9 2.5.Stable9",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…