[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2040-1 squidguard -- buffer overflow

ID: oval:org.secpod.oval:def:600064Date: (C)2011-01-28   (M)2022-10-10
Class: PATCHFamily: unix




It was discovered that in squidguard, a URL redirector/filter/ACL plugin for squid, several problems in src/sgLog.c and src/sgDiv.c allow remote users to either: * cause a denial of service, by requesting long URLs containing many slashes; this forces the daemon into emergency mode, where it does not process requests anymore. * bypass rules by requesting URLs whose length is close to predefined buffer limits, in this case 2048 for squidguard and 4096 or 8192 for squid . For the stable distribution , this problem has been fixed in version 1.2.0-8.4+lenny1. For the unstable distribution , this problem has been fixed in version 1.2.0-9. We recommend that you upgrade your squidguard package.

Platform:
Debian 5.0
Product:
squidguard
Reference:
DSA-2040-1
CVE-2009-3700
CVE-2009-3826
CVE    2
CVE-2009-3700
CVE-2009-3826
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies