Debian DSA-019-1 : squid - insecure tempfile handling

low Nessus Plugin ID 14856

Synopsis

The remote Debian host is missing a security-related update.

Description

WireX discovered a potential temporary file race condition in the way that squid sends out email messages notifying the administrator about updating the program. This could lead to arbitrary files to get overwritten. However the code would only be executed if running a very bleeding edge release of squid, running a server whose time is set some number of months in the past and squid is crashing. Read it as hardly to exploit. This version also contains more upstream bugfixes wrt. dots in hostnames and improper HTML quoting.

Solution

Upgrade the affected squid package.

See Also

http://www.debian.org/security/2001/dsa-019

Plugin Details

Severity: Low

ID: 14856

File Name: debian_DSA-019.nasl

Version: 1.18

Type: local

Agent: unix

Published: 9/29/2004

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Low

Base Score: 1.2

Temporal Score: 0.9

Vector: CVSS2#AV:L/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:2.2, p-cpe:/a:debian:debian_linux:squid

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 1/25/2001

Reference Information

CVE: CVE-2001-0142

BID: 2184

DSA: 019