Vulnerabilities > CVE-2010-0639 - Unspecified vulnerability in Squid-Cache Squid
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN squid-cache
nessus
Summary
The htcpHandleTstRequest function in htcp.c in Squid 2.x before 2.6.STABLE24 and 2.7 before 2.7.STABLE8, and htcp.cc in 3.0 before 3.0.STABLE24, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets to the HTCP port.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_11_SQUID-111222.NASL description This update fixes the following security issue : - 587375: squid NULL deref via HTCP request (CVE-2010-0639) last seen 2020-06-01 modified 2020-06-02 plugin id 57726 published 2012-01-30 reporter This script is Copyright (C) 2012-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57726 title SuSE 11.1 Security Update : squid (SAT Patch Number 5584) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SuSE 11 update information. The text itself is # copyright (C) Novell, Inc. # include("compat.inc"); if (description) { script_id(57726); script_version("1.5"); script_cvs_date("Date: 2019/10/25 13:36:43"); script_cve_id("CVE-2010-0639"); script_name(english:"SuSE 11.1 Security Update : squid (SAT Patch Number 5584)"); script_summary(english:"Checks rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 11 host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes the following security issue : - 587375: squid NULL deref via HTCP request (CVE-2010-0639)" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=587375" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2010-0639.html" ); script_set_attribute(attribute:"solution", value:"Apply SAT patch number 5584."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_cwe_id(20); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:squid"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11"); script_set_attribute(attribute:"patch_publication_date", value:"2011/12/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/01/30"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11"); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu); pl = get_kb_item("Host/SuSE/patchlevel"); if (isnull(pl) || int(pl) != 1) audit(AUDIT_OS_NOT, "SuSE 11.1"); flag = 0; if (rpm_check(release:"SLES11", sp:1, reference:"squid-2.7.STABLE5-2.10.1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2010-060.NASL description A vulnerability has been found and corrected in squid : The htcpHandleTstRequest function in htcp.c in Squid 2.x and 3.0 through 3.0.STABLE23 allows remote attackers to cause a denial of service (crash) via crafted packets to the HTCP port, which triggers a NULL pointer dereference (CVE-2010-0639). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 45031 published 2010-03-11 reporter This script is Copyright (C) 2010-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/45031 title Mandriva Linux Security Advisory : squid (MDVSA-2010:060) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Mandriva Linux Security Advisory MDVSA-2010:060. # The text itself is copyright (C) Mandriva S.A. # include("compat.inc"); if (description) { script_id(45031); script_version("1.12"); script_cvs_date("Date: 2019/08/02 13:32:53"); script_cve_id("CVE-2010-0639"); script_bugtraq_id(38212); script_xref(name:"MDVSA", value:"2010:060"); script_name(english:"Mandriva Linux Security Advisory : squid (MDVSA-2010:060)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Mandriva Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "A vulnerability has been found and corrected in squid : The htcpHandleTstRequest function in htcp.c in Squid 2.x and 3.0 through 3.0.STABLE23 allows remote attackers to cause a denial of service (crash) via crafted packets to the HTCP port, which triggers a NULL pointer dereference (CVE-2010-0639). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue." ); script_set_attribute( attribute:"solution", value:"Update the affected squid and / or squid-cachemgr packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_cwe_id(20); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:squid"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:squid-cachemgr"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2008.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.1"); script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2010.0"); script_set_attribute(attribute:"patch_publication_date", value:"2010/03/10"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/03/11"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc."); script_family(english:"Mandriva Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux"); if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu); flag = 0; if (rpm_check(release:"MDK2008.0", reference:"squid-2.6.STABLE16-1.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2008.0", reference:"squid-cachemgr-2.6.STABLE16-1.6mdv2008.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"squid-3.0-22.3mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.0", reference:"squid-cachemgr-3.0-22.3mdv2009.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.1", reference:"squid-3.0-22.3mdv2009.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2009.1", reference:"squid-cachemgr-3.0-22.3mdv2009.1", yank:"mdv")) flag++; if (rpm_check(release:"MDK2010.0", reference:"squid-3.0-22.3mdv2010.0", yank:"mdv")) flag++; if (rpm_check(release:"MDK2010.0", reference:"squid-cachemgr-3.0-22.3mdv2010.0", yank:"mdv")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family SuSE Local Security Checks NASL id SUSE_11_3_SQUID-111222.NASL description This update fixes the following security issues : - 587375: NULL deref via HTCP request (CVE-2010-0639) last seen 2020-06-01 modified 2020-06-02 plugin id 75745 published 2014-06-13 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75745 title openSUSE Security Update : squid (openSUSE-SU-2012:0102-1) NASL family SuSE Local Security Checks NASL id SUSE_11_4_SQUID-111222.NASL description This update fixes the following security issues : - 587375: NULL deref via HTCP request (CVE-2010-0639) last seen 2020-06-01 modified 2020-06-02 plugin id 76029 published 2014-06-13 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/76029 title openSUSE Security Update : squid (openSUSE-SU-2012:0102-1) NASL family Firewalls NASL id SQUID_3_0_24.NASL description According to its banner, the version of the Squid proxy caching server installed on the remote host is older than 3.0.STABLE24 / 2.7.STABLE8 / 2.6.STABLE24. Such versions de-reference a NULL pointer while handling certain Hypertext Caching Protocol (HTCP) requests. This mishandling can be abused by a remote attacker to cause a denial of service by sending specially crafted HTCP requests to an affected service. Note that Nessus has relied only on the version in the proxy server last seen 2020-06-01 modified 2020-06-02 plugin id 45591 published 2010-04-21 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/45591 title Squid < 3.0.STABLE24 / 2.7.STABLE8 / 2.6.STABLE24 NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201110-24.NASL description The remote host is affected by the vulnerability described in GLSA-201110-24 (Squid: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Squid. Please review the CVE identifiers referenced below for details. Impact : Remote unauthenticated attackers may be able to execute arbitrary code with the privileges of the Squid process or cause a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 56658 published 2011-10-27 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56658 title GLSA-201110-24 : Squid: Multiple vulnerabilities NASL family Fedora Local Security Checks NASL id FEDORA_2010-2434.NASL description Denial of service issue in HTCP processing (SQUID-2010:2) http://www.squid- cache.org/Advisories/SQUID-2010_2.txt Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 47291 published 2010-07-01 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/47291 title Fedora 11 : squid-3.0.STABLE24-1.fc11 (2010-2434) NASL family Fedora Local Security Checks NASL id FEDORA_2010-3064.NASL description Denial of service issue in HTCP processing (SQUID-2010:2) http://www.squid- cache.org/Advisories/SQUID-2010_2.txt Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 47299 published 2010-07-01 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/47299 title Fedora 12 : squid-3.1.0.16-6.fc12 (2010-3064) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-904-1.NASL description It was discovered that Squid incorrectly handled certain malformed packets received on the HTCP port. A remote attacker could exploit this with a specially crafted packet and cause Squid to crash, resulting in a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 44913 published 2010-02-25 reporter Ubuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/44913 title Ubuntu 8.04 LTS / 8.10 / 9.04 / 9.10 : squid vulnerability (USN-904-1) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_81D9DC0C198811DF8E660019996BC1F7.NASL description Squid security advisory 2010:2 reports : Due to incorrect processing Squid is vulnerable to a denial of service attack when receiving specially crafted HTCP packets. This problem allows any machine to perform a denial of service attack on the Squid service when its HTCP port is open. last seen 2020-06-01 modified 2020-06-02 plugin id 44601 published 2010-02-15 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/44601 title FreeBSD : squid -- Denial of Service vulnerability in HTCP (81d9dc0c-1988-11df-8e66-0019996bc1f7)
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 38212 CVE ID: CVE-2010-0639 Squid是一个高效的Web缓存及代理程序,最初是为Unix平台开发的,现在也被移植到Linux和大多数的Unix类系统中,最新的Squid可以运行在Windows平台下。 远程攻击者可以通过向Squid的HTCP端口发送畸形报文触发空指针引用,导致Squid崩溃。 Squid Web Proxy Cache 3.0 Squid Web Proxy Cache 2.x 临时解决方法: 如果您不能立刻安装补丁或者升级,NSFOCUS建议您采取以下措施以降低威胁: 对于Squid-2.x * 明确配置htcp_port 0 对于Squid-3.0 * 升级到3.0版本后删除squid.conf中所有非必需的htcp_port设置 厂商补丁: Squid ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://www.squid-cache.org/Versions/v2/2.7/changesets/12600.patch http://www.squid-cache.org/Versions/v3/3.0/changesets/3.0-ADV-2010_2.patch Ubuntu ------ Ubuntu已经为此发布了一个安全公告(USN-904-1)以及相应补丁: USN-904-1:Squid vulnerability 链接:http://www.ubuntu.com/usn/USN-904-1 |
id | SSV:19188 |
last seen | 2017-11-19 |
modified | 2010-02-26 |
published | 2010-02-26 |
reporter | Root |
title | Squid Web代理缓存HTCP请求远程拒绝服务漏洞 |
Statements
contributor | Tomas Hoger |
lastmodified | 2010-02-16 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of squid as shipped with Red Hat Enterprise Linux 3, 4, or 5. Those versions are not compiled with the support for HTCP protocol. |
References
- http://osvdb.org/62297
- http://www.squid-cache.org/Versions/v2/2.7/changesets/12600.patch
- http://www.vupen.com/english/advisories/2010/0371
- http://www.squid-cache.org/Advisories/SQUID-2010_2.txt
- http://bugs.squid-cache.org/show_bug.cgi?id=2858
- http://www.securitytracker.com/id?1023587
- http://www.squid-cache.org/Versions/v3/3.0/changesets/3.0-ADV-2010_2.patch
- http://www.securityfocus.com/bid/38212
- http://www.vupen.com/english/advisories/2010/0603
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037159.html
- http://secunia.com/advisories/38812
- http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035961.html