Bug 65421 (CVE-2005-0241) - VUL-0: CVE-2005-0241: more squid security issues
Summary: VUL-0: CVE-2005-0241: more squid security issues
Status: RESOLVED FIXED
Alias: CVE-2005-0241
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Critical
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-0241: CVSS v2 Base Score: 5....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-02-02 19:57 UTC by Marcus Meissner
Modified: 2021-10-27 15:54 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2005-02-02 19:57:50 UTC
======================================================                           
Candidate: CAN-2005-0211                                                         
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0211                 
Final-Decision:                                                                  
Interim-Decision:                                                                
Modified:                                                                        
Proposed:                                                                        
Assigned: 20050201                                                               
Category: SF                                                                     
Reference:                                                                       
CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_overflow                                                                
Reference:                                                                       
CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-wccp_buffer_overflow.patch                                                           
                                                                                 
Buffer overflow in wccp.c in Squid 2.5 before 2.5.STABLE7 allows                 
remote attackers to cause a denial of service and possibly execute               
arbitrary code via a long WCCP packet, which is processed by a                   
recvfrom function call that uses an incorrect length parameter.
Comment 1 Marcus Meissner 2005-02-02 19:57:50 UTC
<!-- SBZ_reproduce  -->
n/a
Comment 2 Marcus Meissner 2005-02-02 19:58:00 UTC
klaus, please check if we are affected. 
Comment 3 Marcus Meissner 2005-02-02 19:58:55 UTC
there is also: 
http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-oversize_reply_headers.patch 
 
Did we fix that already, or not? 
Comment 4 Klaus Singvogel 2005-02-02 20:34:29 UTC
No, didn't saw them before. Both are new to me. --> affected. 
 
Working on it. 
Comment 5 Sebastian Krahmer 2005-02-02 20:39:13 UTC
On Wednesday 02 February 2005 12:44, Martin Schulze wrote:
> ARGS.  What does CAN-2005-0095 refer to then?
If my notes are correct it is two different wccp issues:

CAN-2005-0095:
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_denial_o
f_service

CAN-2005-0211:
http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-wccp_buffer_o
verflow

Comment 6 Marcus Meissner 2005-02-02 20:44:58 UTC
the 0095 one was fixed with the previous update I think. 
Comment 7 Marcus Meissner 2005-02-02 20:53:32 UTC
swamp master id: 321 
 
Comment 8 Marcus Meissner 2005-02-08 20:12:10 UTC
======================================================                           
Candidate: CAN-2005-0241                                                         
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0241                 
Reference: CONFIRM:http://www.squid-cache.org/bugs/show_bug.cgi?id=1216          
Reference:                                                                       
+CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-over 
+size_reply_headers                                                              
Reference:                                                                       
+CONFIRM:http://www.squid-cache.org/Versions/v2/2.5/bugs/squid-2.5.STABLE7-overs 
+ize_reply_headers.patch                                                         
                                                                                 
The httpProcessReplyHeader function in http.c for Squid 2.5-STABLE7              
and earlier does not properly set the debug context when it is                   
handling "oversized" HTTP reply headers, with unknown impact.                    
Comment 9 Marcus Meissner 2005-02-08 20:12:39 UTC
(we have the patch in the current packages, just not the correct CAN ID) 
Comment 10 Klaus Singvogel 2005-02-08 20:43:38 UTC
I already submitted the packages. 
 
Don't know, why I still have the bug. The fixed packages are also back 
in /work/SRC, e.g. in /work/SRC/old-versions/9.2/all/squid/ 
 
Don't know what else to do --> reassinging it 
Comment 11 Marcus Meissner 2005-02-08 20:46:20 UTC
you had the bug because you did not reassign it back to us ;) 
 
Thanks Klaus! 
Comment 12 Marcus Meissner 2005-02-10 19:30:51 UTC
on squid bug webpage -> public 
Comment 13 Marcus Meissner 2005-02-10 19:32:51 UTC
updated packages approved. 
Comment 14 Thomas Biege 2005-02-14 16:21:00 UTC
update seems to be flawed. 
 
Date: Sat, 12 Feb 2005 15:21:51 -0600 
To: Thomas Biege <thomas@suse.de> 
From: Mark Condic <condic@comcast.net> 
Subject: Re: [suse-security-announce] SUSE Security Announcement: 
squid 
  (SUSE-SA:2005:006) 
 
The latest SuSE 9.2 security update of squid has a generated thousands of 
entries in the logs /var/log/messages: 
 
squid[3455]: ctx: enter level 2254: '<lost>' 
... 
squid[3455]: httpReadReply: Excess data from "GET 
http://www.amazon.com/ 
 
I don't see any information in the changelog.  There is no new 
squid.conf.rpmnew.  This is using up a lot of CPU time, as well as .  Any 
ideas of what is causing this?  How can I fix it?  Any URL's you can point 
me to?  In the discussion group, others have complained of the same 
problem, without any solutions.  Thanks 
 
------------------------------------------------------------------- 
 
Comment 15 Thomas Biege 2005-02-14 17:47:28 UTC
> 
>                         SUSE Security Announcement 
> 
>         Package:                squid 
>         Announcement-ID:        SUSE-SA:2005:006 
>         Date:                   Thursday, Feb 10th 2005 13:30 MET 
>         Affected products:      8.1, 8.2, 9.0, 9.1, 9.2 
 
Hallo Thomas, 
ein kleines Problem nach der Installation der SuSE 9.0  i586.patch.rpm: 
(aktueller 2.4.21-273-default-Kernel) 
/var/log # tail messages 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 504: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 505: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 506: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 507: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 508: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 509: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 510: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 511: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: ctx: enter level 512: '<lost>' 
Feb 11 10:24:07 portal2 squid[7203]: # ctx: suspiciously deep (512) nesting 
 
Probleme bei der Kompilierung der rpm? 
 
Schönes Wochenende! 
 
Klaus Sarrach 
Administrator 
 
Comment 16 Marcus Meissner 2005-02-15 00:24:59 UTC
critical problems at customer end  
Comment 17 Klaus Singvogel 2005-02-15 02:31:22 UTC
no idea at the moment. working on it. 
Comment 18 Klaus Singvogel 2005-02-15 04:07:50 UTC
Think, I found the problem. 
As the patch didn't applied from itself, I patched it manually and forgot to 
remove a small "ctx_enter(entry->mem_obj->url);" 
Comment 19 Klaus Singvogel 2005-02-15 05:06:51 UTC
Peter reported the problem first (and was former squid maintainer). Think he 
should get access... 
Comment 20 Peter Poeml 2005-02-15 05:53:04 UTC
Klaus -- I have installed the fixed packages you just built on one 92
and one 90 machine, and the problem appears gone.
Comment 21 Klaus Singvogel 2005-02-15 05:54:53 UTC
Packages are submitted. 
Nevertheless it seems to be gone: testing-team please test them... 
 
-> reassign to security-team for further bug processing. 
Comment 22 Marcus Meissner 2005-02-15 16:29:15 UTC
move to suselinux category. 
Comment 23 Marcus Meissner 2005-02-15 16:37:19 UTC
new swampid: 391 
Comment 24 Thomas Biege 2005-02-15 16:46:57 UTC
 SM-Tracker-392 
Comment 25 Thomas Biege 2005-02-15 16:48:56 UTC
:) already submitted a patchinfo with 392 .. i'll delete 391, ok? 
Comment 26 Klaus Singvogel 2005-02-15 16:51:03 UTC
For the  patchinfo:  
the last security fix caused a memory leak.  
  
Can't explain, why it suddenly became slower, as someone mentioned. Maybe  
because of the many logfiles entries? 
Comment 27 Thomas Biege 2005-02-15 16:54:03 UTC
/work/src/done/PATCHINFO/squid.1nzeUs 
/work/src/done/PATCHINFO/squid.XyXR6t 
Comment 28 Thomas Biege 2005-02-15 16:56:16 UTC
comment #26: I'll not mention the memory leak. ;-) I would bed on the 
log-entry generation too. 
Comment 29 Marcus Meissner 2005-02-21 17:04:33 UTC
updates released. 
Comment 30 Thomas Biege 2009-10-13 21:03:06 UTC
CVE-2005-0241: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:P/A:N)