Summary
The remote host is missing an update to squid
announced via advisory MDVSA-2009:161-1.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:161-1 http://www.squid-cache.org/Advisories/SQUID-2009_2.txt
Insight
Multiple vulnerabilities has been found and corrected in squid:
Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses (CVE-2009-2621).
Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses (CVE-2009-2622).
This update provides fixes for these vulnerabilities.
Update:
Additional upstream security patches were applied:
Debug warnings fills up the logs.
Upstream Bug 2728: regression: assertion failed: http.cc:705: !eof
Affected: 2008.1, 2009.0, 2009.1, Enterprise Server 5.0
Severity
Classification
-
CVE CVE-2009-2621, CVE-2009-2622 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities