Summary
The host is installed with SquidGuard and is prone to multiple Buffer Overflow vulnerabilities.
Impact
Remote attackers can exploit this issue to bypass the filter security and to cause Denail of Service due to application hang.
Impact Level: System/Application
Solution
Apply the following patches.
http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091019 http://www.squidguard.org/Downloads/Patches/1.4/Readme.Patch-20091015
*****
NOTE: Please ignore this waring if the above mentioned patches are already applied.
*****
Insight
- A boundary error occurs in 'sgLog.c' while handling overly long URLs with multiple '/' characters while operating in the emergency mode.
- Multiple buffer overflow errors occur in 'sg.h.in' and 'sgDiv.c.in' while processing overly long URLs and can be exploited to bypass the URL filter.
Affected
SquidGuard version 1.3 and 1.4
References
Severity
Classification
-
CVE CVE-2009-3700, CVE-2009-3826 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- ZoneAlarm Internet Security Suite Buffer Overflow Vulnerability
- Novell File Reporter 'SRS' Tag Arbitrary File Deletion Vulnerability
- VLC Media Player '.RM' File BOF Vulnerability (Linux)
- Microsoft Windows Media Player '.mpg' Buffer Overflow Vulnerability
- VLC Media Player '.AVI' File BOF Vulnerability (Windows)