Vulnerabilities > CVE-2001-0843 - Unspecified vulnerability in Squid web Proxy

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
squid
nessus

Summary

Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request.

Vulnerable Configurations

Part Description Count
Application
Squid
1

Nessus

  • NASL familyFirewalls
    NASL idSQUID_DOS.NASL
    descriptionA problem exists in the way the remote Squid proxy server handles a special
    last seen2020-06-01
    modified2020-06-02
    plugin id10768
    published2001-09-26
    reporterThis script is Copyright (C) 2001-2018 Adam Baldwin
    sourcehttps://www.tenable.com/plugins/nessus/10768
    titleSquid mkdir-only PUT Request Remote DoS
    code
    #
    # This script was written by Adam Baldwin <[email protected]>
    #
    # See the Nessus Scripts License for details
    #
    
    # Changes by Tenable:
    # - Revised plugin title (6/16/09)
    # - Standardized product name in title (6/25/09)
    # - Change plugin family (7/6/09)
    # - Updated to use compat.inc, added CVSS score (11/20/2009)
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(10768);
     script_version ("1.28");
     script_cve_id("CVE-2001-0843");
     script_bugtraq_id(3354);
    
     script_name(english:"Squid mkdir-only PUT Request Remote DoS");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote host has an application that is affected by a denial
    of service vulnerability." );
     script_set_attribute(attribute:"description", value:
    "A problem exists in the way the remote Squid proxy server handles a 
    special 'mkdir-only' PUT request, and causes denial of service to the 
    proxy server.
    
    An attacker may use this flaw to prevent your LAN users from accessing
    the web." );
     script_set_attribute(attribute:"solution", value:
    "Apply the vendor released patch, for squid it is located here: 
    www.squid-cache.org.  You can also protect yourself by enabling access 
    lists on your proxy.
    
    *** Note that Nessus solely relied on the version number of the remote
    *** proxy to issue this warning" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
    
     script_set_attribute(attribute:"plugin_publication_date", value: "2001/09/26");
     script_set_attribute(attribute:"vuln_publication_date", value: "2001/09/21");
     script_cvs_date("Date: 2018/08/22 16:49:14");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_set_attribute(attribute:"cpe", value:"cpe:/a:squid-cache:squid");
    script_end_attributes();
    
     script_summary(english:"Determines via ver. if a proxy server is DoSable");
     script_category(ACT_GATHER_INFO);
     script_family(english:"Firewalls");
     script_copyright(english:"This script is Copyright (C) 2001-2018 Adam Baldwin");
     script_dependencies("find_service1.nasl", "proxy_use.nasl");
     script_require_ports("Services/http_proxy", 8080, 3128);
     exit(0);
    }
    
    #
    # Code Starts Here
    #
    
    include("http_func.inc");
    
    port = get_kb_item("Services/http_proxy");
    if(!port)port = 3128;
    if(!get_port_state(port))port = 8080;
    
    
    if(get_port_state(port))
    {
     soc = http_open_socket(port);
     if(soc)
     {
      sData = http_get(item:"http://www.$$$$$", port:port);
      send(socket:soc, data:sData);
      data = http_recv(socket:soc);
      http_close_socket(soc);
      data = egrep(pattern: "^Server: ", string: data);
    
      if("Squid" >< data)
      {
       data = data - string("Server: Squid/");
       #See if it's a vulnerable version
       #CHECK VERSION 2.3
       if(("2.3" >< data) && ("STABLE2" >< data) ||
      	 		 ("STABLE3" >< data) ||
    			 ("STABLE4" >< data) ||
    			 ("STABLE5" >< data))
       {
        security_warning(port);
       }
       #CHECK VERSION 2.4
       if(("2.4" >< data) && ("STABLE1" >< data) || 
    			 ("PRE-STABLE2" >< data) || 
    			 ("PRE-STABLE" >< data) ||
    			 ("DEVEL4" >< data) ||
    			 ("DEVEL2" >< data))
       {
        security_warning(port);
       }
      }
     }
    }
    
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2001-088.NASL
    descriptionVladimir Ivaschenko found a problem in the squid proxy server. Certain FTP requests could cause the squid daemon to abort, making it unavailable for a few seconds. If enough of these requests are sent in a short period of time, the squid daemon will not restart itself.
    last seen2020-06-01
    modified2020-06-02
    plugin id13901
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13901
    titleMandrake Linux Security Advisory : squid (MDKSA-2001:088)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandrake Linux Security Advisory MDKSA-2001:088. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(13901);
      script_version ("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:46");
    
      script_cve_id("CVE-2001-0843");
      script_xref(name:"MDKSA", value:"2001:088");
    
      script_name(english:"Mandrake Linux Security Advisory : squid (MDKSA-2001:088)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Mandrake Linux host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vladimir Ivaschenko found a problem in the squid proxy server. Certain
    FTP requests could cause the squid daemon to abort, making it
    unavailable for a few seconds. If enough of these requests are sent in
    a short period of time, the squid daemon will not restart itself."
      );
      # http://www.squid-cache.org/bugs/show_bug.cgi?id=233
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugs.squid-cache.org/show_bug.cgi?id=233"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected squid package.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:squid");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.1");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2001/11/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"squid-2.3.STABLE5-2.3mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"squid-2.3.STABLE5-2.2mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK8.0", cpu:"i386", reference:"squid-2.3.STABLE5-2.1mdk", yank:"mdk")) flag++;
    
    if (rpm_check(release:"MDK8.1", cpu:"i386", reference:"squid-2.4.STABLE1-8.1mdk", yank:"mdk")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-077.NASL
    descriptionVladimir Ivaschenko found a problem in squid (a popular proxy cache). He discovered that there was a flaw in the code to handle FTP PUT commands: when a mkdir-only request was done squid would detect an internal error and exit. Since squid is configured to restart itself on problems this is not a big problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id14914
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14914
    titleDebian DSA-077-1 : squid - remote DoS
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-077. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(14914);
      script_version("1.17");
      script_cvs_date("Date: 2019/08/02 13:32:16");
    
      script_cve_id("CVE-2001-0843");
      script_bugtraq_id(3354);
      script_xref(name:"DSA", value:"077");
    
      script_name(english:"Debian DSA-077-1 : squid - remote DoS");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Vladimir Ivaschenko found a problem in squid (a popular proxy cache).
     He discovered that there was a flaw in the code to handle FTP PUT
     commands: when a mkdir-only request was done squid would detect an
     internal error and exit. Since squid is configured to restart itself
     on problems this is not a big problem."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.debian.org/security/2001/dsa-077"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "This has been fixed in version 2.2.5-3.2. This problem is logged as
    bug 233 in the squid bugtracker and will also be fixed in future squid
    releases."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:squid");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2001/09/24");
      script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"2.2", prefix:"squid", reference:"2.2.5-3.2")) flag++;
    if (deb_check(release:"2.2", prefix:"squid-cgi", reference:"2.2.5-3.2")) flag++;
    if (deb_check(release:"2.2", prefix:"squidclient", reference:"2.2.5-3.2")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    

Redhat

advisories
rhsa
idRHSA-2001:113