malformed HTTP header attacks (CAN-2005-0174)

Bug #12600 reported by Debian Bug Importer
4
Affects Status Importance Assigned to Milestone
squid (Debian)
Fix Released
Unknown
squid (Ubuntu)
Fix Released
High
Martin Pitt

Bug Description

Automatically imported from Debian bug report #293910 http://bugs.debian.org/293910

CVE References

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Automatically imported from Debian bug report #293910 http://bugs.debian.org/293910

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sun, 6 Feb 2005 14:46:35 -0500
From: Joey Hess <email address hidden>
To: Debian Bug Tracking System <email address hidden>
Subject: malformed HTTP header attacks (CAN-2005-0174)

--gBBFr7Ir9EOA20Yy
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: squid
Version: 2.5.7-4
Severity: grave
Tags: security

CAN-2005-0174 describes some security holes in squid:

  Squid 2.5 up to 2.5.STABLE7 allows remote attackers to poison the cache or
  conduct certain attacks via headers that do not follow the HTTP specifica=
tion,
  including (1) multiple Content-Length headers, (2) carriage return (CR)
  characters that are not part of a CRLF pair, and (3) header names contain=
ing
  whitespace characters.

Details and a patch here:

  http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-header=
_parsing

--=20
see shy jo

--gBBFr7Ir9EOA20Yy
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCBnQbd8HHehbQuO8RAnLYAKC6YEl5a0fLjppRmC+2SdB9owMhtACfaDi/
cFqzwjIF8TJ0nlZmhjwIsb0=
=0TYa
-----END PGP SIGNATURE-----

--gBBFr7Ir9EOA20Yy--

Revision history for this message
Martin Pitt (pitti) wrote :

Fixed Warty in USN-77-1, fixed Hoary by syncing 2.5.7-8.

Revision history for this message
In , Luigi Gangitano (luigi) wrote : CAN-2005-0174 fixed

CAN-2005-0174 has been fixed in 2.5.7-6 with many other security issues.

Regards,

--
 Luigi Gangitano -- <email address hidden> -- <email address hidden>
 GPG: 1024D/924C0C26: 12F8 9C03 89D3 DB4A 9972 C24A F19B A618 924C 0C26

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-Id: <1107809892.5984.1.camel@willis>
Date: Mon, 07 Feb 2005 21:58:12 +0100
From: Luigi Gangitano <email address hidden>
To: <email address hidden>
Subject: CAN-2005-0174 fixed

--=-RVF6zSSVqgWb9oxbWtMY
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

CAN-2005-0174 has been fixed in 2.5.7-6 with many other security issues.

Regards,

--=20
 Luigi Gangitano -- <email address hidden> -- <email address hidden>
 GPG: 1024D/924C0C26: 12F8 9C03 89D3 DB4A 9972 C24A F19B A618 924C 0C26

--=-RVF6zSSVqgWb9oxbWtMY
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: Questa parte del messaggio =?ISO-8859-1?Q?=E8?= firmata

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQBCB9Zk8ZumGJJMDCYRAo2yAJsGsWO5mdrelUMSaK4HKOR0GqyhpgCfYJsv
y9WWt2hrk3ifPvEt6dAhRt0=
=jcns
-----END PGP SIGNATURE-----

--=-RVF6zSSVqgWb9oxbWtMY--

Changed in squid:
status: Unknown → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.