Vulnerabilities > CVE-2005-0446 - Remote Denial Of Service vulnerability in Squid Proxy DNS Name Resolver
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
PARTIAL Summary
Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure.
Vulnerable Configurations
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2005-153.NASL description This update fixes CVE-2005-0446 Squid DoS from bad DNS response Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 19614 published 2005-09-12 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19614 title Fedora Core 2 : squid-2.5.STABLE8-1.FC2.1 (2005-153) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200502-25.NASL description The remote host is affected by the vulnerability described in GLSA-200502-25 (Squid: Denial of Service through DNS responses) Handling of certain DNS responses trigger assertion failures. Impact : By returning a specially crafted DNS response an attacker could cause Squid to crash by triggering an assertion failure. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 17144 published 2005-02-18 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17144 title GLSA-200502-25 : Squid: Denial of Service through DNS responses NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-201.NASL description An updated squid package that fixes a denial of service issue is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Squid is a full-featured Web proxy cache. A bug was found in the way Squid handles fully qualified domain name (FQDN) lookups. A malicious DNS server could crash Squid by sending a carefully crafted DNS response to an FQDN lookup. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0446 to this issue. This erratum also includes two minor patches to the LDAP helpers. One corrects a slight malformation in ldap search requests (although all known LDAP servers accept the requests). The other adds documentation for the -v option to the ldap helpers. Users of Squid should upgrade to this updated package, which contains a backported patch, and is not vulnerable to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 17340 published 2005-03-16 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/17340 title RHEL 4 : squid (RHSA-2005:201) NASL family SuSE Local Security Checks NASL id SUSE_SA_2005_008.NASL description The remote host is missing the patch for the advisory SUSE-SA:2005:008 (squid). Squid is an Open Source web proxy. A remote attacker was potentially able to crash the Squid web proxy if the log_fqdn option was set to last seen 2020-06-01 modified 2020-06-02 plugin id 17198 published 2005-02-23 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17198 title SUSE-SA:2005:008: squid NASL family Fedora Local Security Checks NASL id FEDORA_2005-154.NASL description This update fixes CVE-2005-0446 Squid DoS from bad DNS response Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 19615 published 2005-09-12 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/19615 title Fedora Core 3 : squid-2.5.STABLE8-1.FC3.1 (2005-154) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-212.NASL description An updated dhcp package that fixes a string format issue is now available for Red Hat Enterprise Linux 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The dhcp package provides the ISC Dynamic Host Configuration Protocol (DHCP) server and relay agent, dhcpd. DHCP is a protocol that allows devices to get their own network configuration information from a server. A bug was found in the way dhcpd logs error messages. A malicious DNS server could send a carefully crafted DNS reply and cause dhcpd to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0446 to this issue. All users of dhcp should upgrade to this updated package, which contains a backported patch and is not vulnerable to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 18018 published 2005-04-12 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18018 title RHEL 2.1 : dhcp (RHSA-2005:212) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_5BF1A715CC57440FB0A56406961C54A7.NASL description The Squid team reported several denial-of-service vulnerabilities related to the handling of DNS responses and NT Lan Manager messages. These may allow an attacker to crash the Squid cache. last seen 2020-06-01 modified 2020-06-02 plugin id 18947 published 2005-07-13 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/18947 title FreeBSD : squid -- denial-of-service vulnerabilities (5bf1a715-cc57-440f-b0a5-6406961c54a7) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-688.NASL description Upstream developers have discovered several problems in squid, the Internet object cache, the popular WWW proxy cache. A remote attacker can cause squid to crash via certain DNS responses. last seen 2020-06-01 modified 2020-06-02 plugin id 17196 published 2005-02-23 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17196 title Debian DSA-688-1 : squid - missing input sanitising NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2005-173.NASL description Updated squid packages that fix a denial of service issue are now available. This update has been rated as having important security impact by the Red Hat Security Response Team Squid is a full-featured Web proxy cache. A bug was found in the way Squid handles FQDN lookups. It was possible to crash the Squid server by sending a carefully crafted DNS response to an FQDN lookup. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-0446 to this issue. Users of squid should upgrade to this updated package, which contains a backported patch, and is not vulnerable to this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 17264 published 2005-03-04 reporter This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/17264 title RHEL 2.1 / 3 : squid (RHSA-2005:173) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2005-047.NASL description The squid developers discovered that a remote attacker could cause squid to crash via certain DNS responses. The updated packages are patched to fix the problem. last seen 2020-06-01 modified 2020-06-02 plugin id 17216 published 2005-02-25 reporter This script is Copyright (C) 2005-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17216 title Mandrake Linux Security Advisory : squid (MDKSA-2005:047) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-84-1.NASL description When parsing the configuration file, squid interpreted empty Access Control Lists (ACLs) without defined authentication schemes in a non-obvious way. This could allow remote attackers to bypass intended ACLs. (CAN-2005-0194) A remote Denial of Service vulnerability was discovered in the domain name resolution code. A faulty or malicious DNS server could stop the Squid server immediately by sending a malformed IP address. (CAN-2005-0446). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 20709 published 2006-01-15 reporter Ubuntu Security Notice (C) 2005-2019 Canonical, Inc. / NASL script (C) 2006-2016 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20709 title Ubuntu 4.10 : squid vulnerabilities (USN-84-1)
Oval
accepted | 2013-04-29T04:12:46.429-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||
description | Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure. | ||||||||||||||||||||
family | unix | ||||||||||||||||||||
id | oval:org.mitre.oval:def:11264 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||
title | Squid 2.5.STABLE8 and earlier allows remote attackers to cause a denial of service (crash) via certain DNS responses regarding (1) Fully Qualified Domain Names (FQDN) in fqdncache.c or (2) IP addresses in ipcache.c, which trigger an assertion failure. | ||||||||||||||||||||
version | 26 |
Redhat
advisories |
| ||||||||
rpms |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000931
- http://fedoranews.org/updates/FEDORA--.shtml
- http://marc.info/?l=bugtraq&m=110901183320453&w=2
- http://secunia.com/advisories/14271
- http://www.debian.org/security/2005/dsa-688
- http://www.gentoo.org/security/en/glsa/glsa-200502-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:047
- http://www.redhat.com/support/errata/RHSA-2005-173.html
- http://www.redhat.com/support/errata/RHSA-2005-201.html
- http://www.securityfocus.com/bid/12551
- http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE8-dns_assert
- http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE8-dns_assert.patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19332
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11264