Debian alert: squid FTP PUT problem

Posted by dave on Sep 23, 2001 3:52 PM EDT
Mailing list
Mail this story
Print this story

Vladimir Ivaschenko found a problem in squid (a popular proxy cache). He discovered that there was a flaw in the code to handle FTP PUT commands: when a mkdir-only request was done squid would detect an internal error and exit. Since squid is configured to restart itself on problems this is not a big problem.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-077-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
September 24, 2001
- ------------------------------------------------------------------------


Package        : squid
Problem type   : remote DoS
Debian-specific: no

Vladimir Ivaschenko found a problem in squid (a popular proxy cache).
He discovered that there was a flaw in the code to handle FTP PUT
commands: when a mkdir-only request was done squid would detect
an internal error and exit. Since squid is configured to restart
itself on problems this is not a big problem.

This has been fixed in version 2.2.5-3.2. This problem is logged
as bug 233 in the squid bugtracker and will also be fixed in
future squid releases.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5-3.2.diff.gz
      MD5 checksum: 313ec322ee2f0a1ada034b663e3c1900
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5-3.2.dsc
      MD5 checksum: b5bee93a16b453ddfcfcba47ff890e15
    http://security.debian.org/dists/stable/updates/main/source/squid_2.2.5.orig.tar.gz
      MD5 checksum: 3ae40a4f21b110553446fe3d92ed2bda

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squid-cgi_2.2.5-3.2_alpha.deb
      MD5 checksum: fae45705a7ee232f8d03b4732a12df63
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squid_2.2.5-3.2_alpha.deb
      MD5 checksum: eadbb969803ff90c5dcdc303045d62ea
    http://security.debian.org/dists/stable/updates/main/binary-alpha/squidclient_2.2.5-3.2_alpha.deb
      MD5 checksum: 30928ec74d7e99c6153e2955d9cd1ab6

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/squid-cgi_2.2.5-3.2_arm.deb
      MD5 checksum: 7a35d908fa1d2388085a0298701bee04
    http://security.debian.org/dists/stable/updates/main/binary-arm/squid_2.2.5-3.2_arm.deb
      MD5 checksum: e4370d9686faf2e9b60c2014fb912255
    http://security.debian.org/dists/stable/updates/main/binary-arm/squidclient_2.2.5-3.2_arm.deb
      MD5 checksum: 3e14d433f3032c5b1877591aa6fb9b83

  Intel IA-32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/squid-cgi_2.2.5-3.2_i386.deb
      MD5 checksum: 1e13385cb135b8b887055b8de6122b28
    http://security.debian.org/dists/stable/updates/main/binary-i386/squid_2.2.5-3.2_i386.deb
      MD5 checksum: edaf764ff5b74e852385668f72d9f637
    http://security.debian.org/dists/stable/updates/main/binary-i386/squidclient_2.2.5-3.2_i386.deb
      MD5 checksum: e5c24bec77c9dcaf4025dce215821bc3

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squid-cgi_2.2.5-3.2_m68k.deb
      MD5 checksum: 3585d677749848a5137cd28047c3279c
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squid_2.2.5-3.2_m68k.deb
      MD5 checksum: 62d419bafd69b29dce27726ee7abee40
    http://security.debian.org/dists/stable/updates/main/binary-m68k/squidclient_2.2.5-3.2_m68k.deb
      MD5 checksum: a3008be51bf14268e155230c194e2281

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squid-cgi_2.2.5-3.2_powerpc.deb
      MD5 checksum: 76c77d85a764797fc89f1b0112a141e9
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squid_2.2.5-3.2_powerpc.deb
      MD5 checksum: 9170efeb0e7507aa0e2757877aee2b7b
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/squidclient_2.2.5-3.2_powerpc.deb
      MD5 checksum: 3b0aa78c0eab2e27e09aa10f8972aa25

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squid-cgi_2.2.5-3.2_sparc.deb
      MD5 checksum: 3d072245558b082c58b7446af5bedeba
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squid_2.2.5-3.2_sparc.deb
      MD5 checksum: 40cb9da4742bfd4cd1c11536a360f384
    http://security.debian.org/dists/stable/updates/main/binary-sparc/squidclient_2.2.5-3.2_sparc.deb
      MD5 checksum: b77a77b1f119cf3b371bd9a87f3ebd6a

  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBO651uqjZR/ntlUftAQFckQMAk7DIkzej1jKv6IE22YhhAm2m+xk1Bp3s
/yJ02CCH/z60re5UGcX1s2LP2EKRJ9PZAgP3Lqa/IO+i5Hs0M1YzS2MOVsW7oeHm
cU91omR5ENhHFSqMRtWoyNRkDalN7Dg0
=f4ul
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.