Secunia Security Advisory - M.A.Young has reported a vulnerability in Squid, which can be exploited by malicious people to cause a DoS (Denial of Service).
5be3e096618799eaf74f3f677f818df778998a51f47a2697031190954c685a75
TITLE:
Squid FTP Server Response Handling Denial of Service
SECUNIA ADVISORY ID:
SA17271
VERIFY ADVISORY:
http://secunia.com/advisories/17271/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From remote
SOFTWARE:
Squid 2.x
http://secunia.com/product/310/
DESCRIPTION:
M.A.Young has reported a vulnerability in Squid, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in handling certain FTP
server responses. This can be exploited to crash Squid by visiting a
malicious FTP server via the proxy.
The vulnerability has been reported in Squid-2.5 and prior.
SOLUTION:
Apply patch for 2.5.STABLE11:
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE11-rfc1738_do_escape.patch
PROVIDED AND/OR DISCOVERED BY:
M.A.Young
ORIGINAL ADVISORY:
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE11-rfc1738_do_escape
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------