Debian DSA-1646-1 : squid - array bounds check

medium Nessus Plugin ID 34354

Synopsis

The remote Debian host is missing a security-related update.

Description

A weakness has been discovered in squid, a caching proxy server. The flaw was introduced upstream in response to CVE-2007-6239, and announced by Debian in DSA-1482-1. The flaw involves an over-aggressive bounds check on an array resize, and could be exploited by an authorized client to induce a denial of service condition against squid.

Solution

Upgrade the squid packages.

For the stable distribution (etch), these problems have been fixed in version 2.6.5-6etch2.

See Also

https://security-tracker.debian.org/tracker/CVE-2007-6239

https://www.debian.org/security/2008/dsa-1646

Plugin Details

Severity: Medium

ID: 34354

File Name: debian_DSA-1646.nasl

Version: 1.16

Type: local

Agent: unix

Published: 10/7/2008

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:4.0, p-cpe:/a:debian:debian_linux:squid

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 10/7/2008

Reference Information

CVE: CVE-2008-1612

BID: 28693

CWE: 20

DSA: 1646