lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 23 Jan 2007 16:42:39 -0700
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:026 ] - Updated squid packages fix
	vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:026
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : squid
 Date    : January 23, 2007
 Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
           Multi Network Firewall 2.0
 _______________________________________________________________________
 
 Problem Description:
 
 A vulnerability in squid was discovered that could be remotely
 exploited by using a special ftp:// URL (CVE-2007-0247).

 Another Denial of Service vulnerability was discovered in squid 2.6
 that allows remote attackers to crash the server by causing an
 external_acl_queue overload (CVE-2007-0248).

 Additionally, a bug in squid 2.6 for max_user_ip handling in ntlm_auth
 has been corrected.

 The updated packages have been patched to correct this problem.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0247
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0248
 http://www.squid-cache.org/bugs/show_bug.cgi?id=1792
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 08e2ff96f1951e61a976ef60bbf6bea5  2006.0/i586/squid-2.5.STABLE10-10.3.20060mdk.i586.rpm
 59613107122da1dd6c0ce6724f563fed  2006.0/i586/squid-cachemgr-2.5.STABLE10-10.3.20060mdk.i586.rpm 
 96bdafa2207c70e46e2c6b958748b884  2006.0/SRPMS/squid-2.5.STABLE10-10.3.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 60c1f397b2ce5b283757b76da8c70df1  2006.0/x86_64/squid-2.5.STABLE10-10.3.20060mdk.x86_64.rpm
 b0ec419dcae41638d2f628f013c0e050  2006.0/x86_64/squid-cachemgr-2.5.STABLE10-10.3.20060mdk.x86_64.rpm 
 96bdafa2207c70e46e2c6b958748b884  2006.0/SRPMS/squid-2.5.STABLE10-10.3.20060mdk.src.rpm

 Mandriva Linux 2007.0:
 21dd893ce118c427d7b34656e41939ec  2007.0/i586/squid-2.6.STABLE1-4.2mdv2007.0.i586.rpm
 4021d4e323f1fc695aa956832ede5dbd  2007.0/i586/squid-cachemgr-2.6.STABLE1-4.2mdv2007.0.i586.rpm 
 6800d5a945187fca10197220d3068e01  2007.0/SRPMS/squid-2.6.STABLE1-4.2mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 dd5ac455b5f94d7b5589d1ff80972dc3  2007.0/x86_64/squid-2.6.STABLE1-4.2mdv2007.0.x86_64.rpm
 e9968cd35f6c21988691982ab3d6c9dc  2007.0/x86_64/squid-cachemgr-2.6.STABLE1-4.2mdv2007.0.x86_64.rpm 
 6800d5a945187fca10197220d3068e01  2007.0/SRPMS/squid-2.6.STABLE1-4.2mdv2007.0.src.rpm

 Corporate 3.0:
 95c1ca980282b1c49b50a8507c7fd82d  corporate/3.0/i586/squid-2.5.STABLE9-1.6.C30mdk.i586.rpm 
 7a65ca526a37b6850f4b33f1959d8595  corporate/3.0/SRPMS/squid-2.5.STABLE9-1.6.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 5c575f5fb19da84a3c0f3ee92429c65c  corporate/3.0/x86_64/squid-2.5.STABLE9-1.6.C30mdk.x86_64.rpm 
 7a65ca526a37b6850f4b33f1959d8595  corporate/3.0/SRPMS/squid-2.5.STABLE9-1.6.C30mdk.src.rpm

 Corporate 4.0:
 db2095e0e73bb231ffe40897b1666fbf  corporate/4.0/i586/squid-2.6.STABLE1-4.2.20060mlcs4.i586.rpm
 7fff9071842f6d87f10643a66d858373  corporate/4.0/i586/squid-cachemgr-2.6.STABLE1-4.2.20060mlcs4.i586.rpm 
 46198dfe46b61033924be7a1050bf1d7  corporate/4.0/SRPMS/squid-2.6.STABLE1-4.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 a3431be4855f377ae0efaf7bf60c845f  corporate/4.0/x86_64/squid-2.6.STABLE1-4.2.20060mlcs4.x86_64.rpm
 7953d0208a17451f1465c69d244736fd  corporate/4.0/x86_64/squid-cachemgr-2.6.STABLE1-4.2.20060mlcs4.x86_64.rpm 
 46198dfe46b61033924be7a1050bf1d7  corporate/4.0/SRPMS/squid-2.6.STABLE1-4.2.20060mlcs4.src.rpm

 Multi Network Firewall 2.0:
 6df4b826639660123bd8cbaf045b3efd  mnf/2.0/i586/squid-2.5.STABLE9-1.6.M20mdk.i586.rpm 
 0c6029fd8710939fa1e187acbf2e1c70  mnf/2.0/SRPMS/squid-2.5.STABLE9-1.6.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFtnD3mqjQ0CJFipgRAhh/AKDeZDFmAclCBbLZnW8QhNUqNX3ywACeLpcn
KBexN76SNlVNaZ98ZFcqRyU=
=FiiN
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists