what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-134

Mandriva Linux Security Advisory 2008-134
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An incorrect fix for CVE-2007-6239 resulted in Squid not performing proper bounds checking when processing cache update replies. Because of this, a remote authenticated user might have been able to trigger an assertion error and cause a denial of service. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-1612
SHA-256 | d0d3c8b5ed8a1da403fb42d6a0ee7b6726a9aaa5ff7a50b893de74b1a75cc8ee

Mandriva Linux Security Advisory 2008-134

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:134
http://www.mandriva.com/security/
_______________________________________________________________________

Package : squid
Date : July 4, 2008
Affected: 2007.1, 2008.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

An incorrect fix for CVE-2007-6239 resulted in Squid not performing
proper bounds checking when processing cache update replies. Because
of this, a remote authenticated user might have been able to trigger
an assertion error and cause a denial of service (CVE-2008-1612).

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1612
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
248155a42ab8820fd29fce25995949bf 2007.1/i586/squid-2.6.STABLE7-2.2mdv2007.1.i586.rpm
33503f35607e909e7fcb1ab9be98915e 2007.1/i586/squid-cachemgr-2.6.STABLE7-2.2mdv2007.1.i586.rpm
0fb7e375fa1eb5508d4f87f152eb75f1 2007.1/SRPMS/squid-2.6.STABLE7-2.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
ce99e5e402516f30ebd675cbb8ad45fa 2007.1/x86_64/squid-2.6.STABLE7-2.2mdv2007.1.x86_64.rpm
72697993236ec0a4061b3142bc91f7ee 2007.1/x86_64/squid-cachemgr-2.6.STABLE7-2.2mdv2007.1.x86_64.rpm
0fb7e375fa1eb5508d4f87f152eb75f1 2007.1/SRPMS/squid-2.6.STABLE7-2.2mdv2007.1.src.rpm

Mandriva Linux 2008.0:
8db0c7927b559eeae600de6cbb824028 2008.0/i586/squid-2.6.STABLE16-1.3mdv2008.0.i586.rpm
0bd46c74785037fb1cb126be08fefd25 2008.0/i586/squid-cachemgr-2.6.STABLE16-1.3mdv2008.0.i586.rpm
a1827941570c11ed67cced2dc03c3087 2008.0/SRPMS/squid-2.6.STABLE16-1.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
00768d35f3492d087788160b33faeca1 2008.0/x86_64/squid-2.6.STABLE16-1.3mdv2008.0.x86_64.rpm
a4f7b01925d6638736a14301a88f6327 2008.0/x86_64/squid-cachemgr-2.6.STABLE16-1.3mdv2008.0.x86_64.rpm
a1827941570c11ed67cced2dc03c3087 2008.0/SRPMS/squid-2.6.STABLE16-1.3mdv2008.0.src.rpm

Corporate 3.0:
06592ba582a05df6863bae3ee194e24c corporate/3.0/i586/squid-2.5.STABLE9-1.9.C30mdk.i586.rpm
4711ba95422fa835f4fd6ad01db41e62 corporate/3.0/SRPMS/squid-2.5.STABLE9-1.9.C30mdk.src.rpm

Corporate 3.0/X86_64:
885b67df0ca072442a0355ea2fe11ac5 corporate/3.0/x86_64/squid-2.5.STABLE9-1.9.C30mdk.x86_64.rpm
4711ba95422fa835f4fd6ad01db41e62 corporate/3.0/SRPMS/squid-2.5.STABLE9-1.9.C30mdk.src.rpm

Corporate 4.0:
f294de04b7285866c8c8bd1fc501a37e corporate/4.0/i586/squid-2.6.STABLE1-4.5.20060mlcs4.i586.rpm
7eec6fef4bf1be7356323340c758a242 corporate/4.0/i586/squid-cachemgr-2.6.STABLE1-4.5.20060mlcs4.i586.rpm
48b89f934fd21bea7c454ef507277017 corporate/4.0/SRPMS/squid-2.6.STABLE1-4.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
9409f71fc022129de41ef2882be751e9 corporate/4.0/x86_64/squid-2.6.STABLE1-4.5.20060mlcs4.x86_64.rpm
036c98b8a72a3e283a96b6166ca73024 corporate/4.0/x86_64/squid-cachemgr-2.6.STABLE1-4.5.20060mlcs4.x86_64.rpm
48b89f934fd21bea7c454ef507277017 corporate/4.0/SRPMS/squid-2.6.STABLE1-4.5.20060mlcs4.src.rpm

Multi Network Firewall 2.0:
ec9e5eea1dd1a5ff7a074c727bb27543 mnf/2.0/i586/squid-2.5.STABLE9-1.9.C30mdk.i586.rpm
795c5d666cff5af8e0912cbb1f2bfe4c mnf/2.0/SRPMS/squid-2.5.STABLE9-1.9.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFIbpQAmqjQ0CJFipgRAsR+AJ4g5qnBkSyeSivUD+xaP0Yl8ZqpvACfcSc0
XDy1eYKV1xhQ1PVS+6JR73g=
=xqb/
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close