Vulnerabilities > CVE-2001-0843 - Unspecified vulnerability in Squid web Proxy
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN squid
nessus
Summary
Squid proxy server 2.4 and earlier allows remote attackers to cause a denial of service (crash) via a mkdir-only FTP PUT request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family Firewalls NASL id SQUID_DOS.NASL description A problem exists in the way the remote Squid proxy server handles a special last seen 2020-06-01 modified 2020-06-02 plugin id 10768 published 2001-09-26 reporter This script is Copyright (C) 2001-2018 Adam Baldwin source https://www.tenable.com/plugins/nessus/10768 title Squid mkdir-only PUT Request Remote DoS code # # This script was written by Adam Baldwin <[email protected]> # # See the Nessus Scripts License for details # # Changes by Tenable: # - Revised plugin title (6/16/09) # - Standardized product name in title (6/25/09) # - Change plugin family (7/6/09) # - Updated to use compat.inc, added CVSS score (11/20/2009) include("compat.inc"); if(description) { script_id(10768); script_version ("1.28"); script_cve_id("CVE-2001-0843"); script_bugtraq_id(3354); script_name(english:"Squid mkdir-only PUT Request Remote DoS"); script_set_attribute(attribute:"synopsis", value: "The remote host has an application that is affected by a denial of service vulnerability." ); script_set_attribute(attribute:"description", value: "A problem exists in the way the remote Squid proxy server handles a special 'mkdir-only' PUT request, and causes denial of service to the proxy server. An attacker may use this flaw to prevent your LAN users from accessing the web." ); script_set_attribute(attribute:"solution", value: "Apply the vendor released patch, for squid it is located here: www.squid-cache.org. You can also protect yourself by enabling access lists on your proxy. *** Note that Nessus solely relied on the version number of the remote *** proxy to issue this warning" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2001/09/26"); script_set_attribute(attribute:"vuln_publication_date", value: "2001/09/21"); script_cvs_date("Date: 2018/08/22 16:49:14"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:squid-cache:squid"); script_end_attributes(); script_summary(english:"Determines via ver. if a proxy server is DoSable"); script_category(ACT_GATHER_INFO); script_family(english:"Firewalls"); script_copyright(english:"This script is Copyright (C) 2001-2018 Adam Baldwin"); script_dependencies("find_service1.nasl", "proxy_use.nasl"); script_require_ports("Services/http_proxy", 8080, 3128); exit(0); } # # Code Starts Here # include("http_func.inc"); port = get_kb_item("Services/http_proxy"); if(!port)port = 3128; if(!get_port_state(port))port = 8080; if(get_port_state(port)) { soc = http_open_socket(port); if(soc) { sData = http_get(item:"http://www.$$$$$", port:port); send(socket:soc, data:sData); data = http_recv(socket:soc); http_close_socket(soc); data = egrep(pattern: "^Server: ", string: data); if("Squid" >< data) { data = data - string("Server: Squid/"); #See if it's a vulnerable version #CHECK VERSION 2.3 if(("2.3" >< data) && ("STABLE2" >< data) || ("STABLE3" >< data) || ("STABLE4" >< data) || ("STABLE5" >< data)) { security_warning(port); } #CHECK VERSION 2.4 if(("2.4" >< data) && ("STABLE1" >< data) || ("PRE-STABLE2" >< data) || ("PRE-STABLE" >< data) || ("DEVEL4" >< data) || ("DEVEL2" >< data)) { security_warning(port); } } } }
NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2001-088.NASL description Vladimir Ivaschenko found a problem in the squid proxy server. Certain FTP requests could cause the squid daemon to abort, making it unavailable for a few seconds. If enough of these requests are sent in a short period of time, the squid daemon will not restart itself. last seen 2020-06-01 modified 2020-06-02 plugin id 13901 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13901 title Mandrake Linux Security Advisory : squid (MDKSA-2001:088) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandrake Linux Security Advisory MDKSA-2001:088. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(13901); script_version ("1.17"); script_cvs_date("Date: 2019/08/02 13:32:46"); script_cve_id("CVE-2001-0843"); script_xref(name:"MDKSA", value:"2001:088"); script_name(english:"Mandrake Linux Security Advisory : squid (MDKSA-2001:088)"); script_summary(english:"Checks rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Mandrake Linux host is missing a security update." ); script_set_attribute( attribute:"description", value: "Vladimir Ivaschenko found a problem in the squid proxy server. Certain FTP requests could cause the squid daemon to abort, making it unavailable for a few seconds. If enough of these requests are sent in a short period of time, the squid daemon will not restart itself." ); # http://www.squid-cache.org/bugs/show_bug.cgi?id=233 script_set_attribute( attribute:"see_also", value:"https://bugs.squid-cache.org/show_bug.cgi?id=233" ); script_set_attribute(attribute:"solution", value:"Update the affected squid package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:squid"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:7.2"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.1"); script_set_attribute(attribute:"patch_publication_date", value:"2001/11/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK7.1", cpu:"i386", reference:"squid-2.3.STABLE5-2.3mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK7.2", cpu:"i386", reference:"squid-2.3.STABLE5-2.2mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK8.0", cpu:"i386", reference:"squid-2.3.STABLE5-2.1mdk", yank:"mdk")) flag++; if (rpm_check(release:"MDK8.1", cpu:"i386", reference:"squid-2.4.STABLE1-8.1mdk", yank:"mdk")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-077.NASL description Vladimir Ivaschenko found a problem in squid (a popular proxy cache). He discovered that there was a flaw in the code to handle FTP PUT commands: when a mkdir-only request was done squid would detect an internal error and exit. Since squid is configured to restart itself on problems this is not a big problem. last seen 2020-06-01 modified 2020-06-02 plugin id 14914 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/14914 title Debian DSA-077-1 : squid - remote DoS code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-077. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(14914); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:32:16"); script_cve_id("CVE-2001-0843"); script_bugtraq_id(3354); script_xref(name:"DSA", value:"077"); script_name(english:"Debian DSA-077-1 : squid - remote DoS"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Vladimir Ivaschenko found a problem in squid (a popular proxy cache). He discovered that there was a flaw in the code to handle FTP PUT commands: when a mkdir-only request was done squid would detect an internal error and exit. Since squid is configured to restart itself on problems this is not a big problem." ); script_set_attribute( attribute:"see_also", value:"http://www.debian.org/security/2001/dsa-077" ); script_set_attribute( attribute:"solution", value: "This has been fixed in version 2.2.5-3.2. This problem is logged as bug 233 in the squid bugtracker and will also be fixed in future squid releases." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:squid"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:2.2"); script_set_attribute(attribute:"patch_publication_date", value:"2001/09/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/09/29"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"2.2", prefix:"squid", reference:"2.2.5-3.2")) flag++; if (deb_check(release:"2.2", prefix:"squid-cgi", reference:"2.2.5-3.2")) flag++; if (deb_check(release:"2.2", prefix:"squidclient", reference:"2.2.5-3.2")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
Redhat
advisories |
|
References
- http://archives.neohapsis.com/archives/linux/conectiva/2001-q3/0020.html
- http://archives.neohapsis.com/archives/linux/conectiva/2001-q3/0020.html
- http://marc.info/?l=bugtraq&m=100109679010256&w=2
- http://marc.info/?l=bugtraq&m=100109679010256&w=2
- http://www.debian.org/security/2001/dsa-077
- http://www.debian.org/security/2001/dsa-077
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-088.php3
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-088.php3
- http://www.novell.com/linux/security/advisories/2001_037_squid_txt.html
- http://www.novell.com/linux/security/advisories/2001_037_squid_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-113.html
- http://www.redhat.com/support/errata/RHSA-2001-113.html
- http://www.securityfocus.com/bid/3354
- http://www.securityfocus.com/bid/3354
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7157
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7157