?? squid prior 2.5.stable7 web proxy cache remote denial of service vulnerability.plugin
字號:
<plugin_id>321</plugin_id>
<plugin_name>Squid prior 2.5.STABLE7 Web Proxy Cache Remote Denial of Service Vulnerability</plugin_name>
<plugin_family>Denial of Service</plugin_family>
<plugin_created_date>2004/12/5</plugin_created_date>
<plugin_created_name>David Nester</plugin_created_name>
<plugin_created_email>david at icrew dot org</plugin_created_email>
<plugin_created_web>http://www.icrew.org</plugin_created_web>
<plugin_created_company>iCrew Security</plugin_created_company>
<plugin_version>1.1</plugin_version>
<plugin_protocol>tcp</plugin_protocol>
<plugin_port>3128</plugin_port>
<plugin_procedure_detection>open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *squid/2.5.STABLE*</plugin_procedure_detection>
<plugin_detection_accuracy>80</plugin_detection_accuracy>
<plugin_comment>This plugin was written with the ATK Attack Editor.</plugin_comment>
<bug_published_name>Anonymous</bug_published_name>
<bug_published_web> </bug_published_web>
<bug_published_date>2004/10/11</bug_published_date>
<bug_produced_name>Squid Web Proxy</bug_produced_name>
<bug_produced_web>http://www.squid-cache.org/</bug_produced_web>
<bug_not_affected>Other versions or solutions</bug_not_affected>
<bug_vulnerability_class>Denial Of Service</bug_vulnerability_class>
<bug_description>Squid is a popular unix based web proxy software. A denial of service condition has been disclosed in the SNMP component of Squid that could allow a remote attacker to crash the service by sending a malicious UDP packet. The problem occurs in the code to handle parsing ASN.1 data. Due to a programming error it is possible under certain circumstances to pass a negative value for a field length specifier, causing the service to abort. Note that Squid must be compiled with SNMP support to be vulnerable.</bug_description>
<bug_solution>Download the latest release from the vendor. http://www.squid-cache.org/</bug_solution>
<bug_fixing_time>Approx. 2 hours</bug_fixing_time>
<bug_exploit_availability>No</bug_exploit_availability>
<bug_remote>Yes</bug_remote>
<bug_local>No</bug_local>
<bug_severity>Low</bug_severity>
<bug_popularity>1</bug_popularity>
<bug_simplicity>2</bug_simplicity>
<bug_impact>7</bug_impact>
<bug_risk>2</bug_risk>
<source_cve>CAN-2004-0918</source_cve>
<source_issxforce_id>17688</source_issxforce_id>
<source_rhsa_id>RHSA-2004-591</source_rhsa_id>
<source_literature>Hacking Intern - Angriffe, Strategien, Abwehr, Marc Ruef, Marko Rogge, Uwe Velten and Wolfram Gieseke, November 1, 2002, Data Becker, D黶seldorf, ISBN 381582284X</source_literature>
<source_misc>http://www.squid-cache.org/</source_misc>
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -