Security Update: [CSSA-2002-017.0] Linux: squid compressed DNS answer message boundary failure

From: securityat_private
Date: Thu Apr 25 2002 - 17:30:36 PDT

  • Next message: muttat_private: "Re: Trendmicro - Interscan - List of BCC: is revealed when stripping attachments and notifying destination addresses"

    To: bugtraqat_private announceat_private security-alertsat_private 
    
    ______________________________________________________________________________
    
    		Caldera International, Inc.  Security Advisory
    
    Subject:		Linux: squid compressed DNS answer message boundary failure
    Advisory number: 	CSSA-2002-017.0
    Issue date: 		2002 April 25
    Cross reference:
    ______________________________________________________________________________
    
    
    1. Problem Description
    
    	From Squid advisory SQUID-2002:2 : Error and boundary conditions
    	were not checked when handling compressed DNS answer messages in
    	the internal DNS code (lib/rfc1035.c). A malicious DNS server
    	could craft a DNS reply that would cause Squid to exit with
    	a SIGSEGV.
    
    
    2. Vulnerable Supported Versions
    
    	System				Package
    	----------------------------------------------------------------------
    
    	OpenLinux 3.1.1 Server		prior to squid-2.4.STABLE2-4.i386.rpm
    
    	OpenLinux 3.1 Server		prior to squid-2.4.STABLE2-4.i386.rpm
    
    
    3. Solution
    
    	The proper solution is to install the latest packages.
    
    
    4. OpenLinux 3.1.1 Server
    
    	4.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS
    
    	4.2 Packages
    
    	ce1fbb905f270ca49d9151b6b40507c9	squid-2.4.STABLE2-4.i386.rpm
    
    	4.3 Installation
    
    	rpm -Fvh squid-2.4.STABLE2-4.i386.rpm
    
    	4.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS
    
    	4.5 Source Packages
    
    	b5001b17b2b841a6cd8b196d5789db64	squid-2.4.STABLE2-4.src.rpm
    
    
    5. OpenLinux 3.1 Server
    
    	5.1 Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
    
    	5.2 Packages
    
    	9a72c528ba333d87e1d6719340ee768b	squid-2.4.STABLE2-4.i386.rpm
    
    	5.3 Installation
    
    	rpm -Fvh squid-2.4.STABLE2-4.i386.rpm
    
    	5.4 Source Package Location
    
    	ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS
    
    	5.5 Source Packages
    
    	cd38d3243263a06eba7c20c836709711	squid-2.4.STABLE2-4.src.rpm
    
    
    6. References
    
    	Specific references for this advisory:
    
    		http://www.squid-cache.org/Advisories/SQUID-2002_2.txt
    
    	Caldera OpenLinux security resources:
    		http://www.caldera.com/support/security/index.html
    
    	Caldera UNIX security resources:
    		http://stage.caldera.com/support/security/
    
    	This security fix closes Caldera incidents sr862189, fz520428,
    	and erg711999.
    
    
    7. Disclaimer
    
    	Caldera International, Inc. is not responsible for the misuse
    	of any of the information we provide on this website and/or
    	through our security advisories. Our advisories are a service
    	to our customers intended to promote secure installation and
    	use of Caldera products.
    
    
    8. Acknowledgements
    
    	This vulnerability was discovered and researched by zen-parse
    	<zen-parseat_private>.
    
    ______________________________________________________________________________
    
    
    



    This archive was generated by hypermail 2b30 : Thu Apr 25 2002 - 22:48:35 PDT