ports/76550: [Maintainer/security] www/squid: protect against HTTP resonse split attack and other patches
Thomas-Martin Seck
tmseck at netcologne.de
Fri Jan 21 18:40:32 UTC 2005
>Number: 76550
>Category: ports
>Synopsis: [Maintainer/security] www/squid: protect against HTTP resonse split attack and other patches
>Confidential: no
>Severity: critical
>Priority: high
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: maintainer-update
>Submitter-Id: current-users
>Arrival-Date: Fri Jan 21 18:40:28 GMT 2005
>Closed-Date:
>Last-Modified:
>Originator: Thomas-Martin Seck
>Release: FreeBSD 4.10-STABLE i386
>Organization:
a private site in Germany
>Environment:
FreeBSD ports collection as of Jan 21, 2005.
>Description:
Integrate vendor patches as published on
<http://www.squid-cache.org/Versions/v2/2.5/bugs/>:
- FTP data connection fails on some FTP servers when requesting a directory
without a trailing slash (squid bug #1194)
- Icons fail to load on non-anonymous FTP when using the short_icons_url
configuration directive (squid bug #1203)
- Strengthen squid against HTTP response splitting cache pollution attacks
(squid bug #1200), classified as security issue by the vendor
Proposed VuXML information, entry date left to be filled in:
(Note: I added only a publically accessible link to the Sanctum, Inc.
whitepaper, the squid bug tracker contains a deep link to the PDF
itself; if we are allowed to publish it, it could instead be used as
reference because Sanctum, Inc. wants you to register with them before
you get access to their whitepapers.)
<vuln vid="4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3">
<topic>squid -- HTTP response splitting cache pollution attack</topic>
<affects>
<package>
<name>squid</name>
<range><lt>2.5.7_8</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>According to a whitepaper published by Sanctum, Inc., it
is possible to mount cache poisoning attacks against, among others,
squid proxies by inserting false replies into the HTTP stream.</p>
<p>The squid patches page notes:</p>
<blockquote cite="http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting">
<p>This patch additionally strengthens Squid from the HTTP response
attack described by Sanctum.</p>
</blockquote>
</body>
</description>
<references>
<url>http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting</url>
<url>http://www.squid-cache.org/bugs/show_bug.cgi?id=1200</url>
<url>https://www.watchfire.com/securearea/whitepapers.aspx?id=8</url>
</references>
<dates>
<discovery>2004-03-01</discovery>
<entry></entry>
</dates>
</vuln>
>How-To-Repeat:
>Fix:
Apply this patch:
Index: distinfo
===================================================================
--- distinfo (.../www/squid) (revision 340)
+++ distinfo (.../local/squid) (revision 340)
@@ -32,3 +32,9 @@
SIZE (squid2.5/squid-2.5.STABLE7-fqdn_truncated.patch) = 4484
MD5 (squid2.5/squid-2.5.STABLE7-ldap_spaces.patch) = 8c2eb269b16d757b562ee32a2eb7ef99
SIZE (squid2.5/squid-2.5.STABLE7-ldap_spaces.patch) = 1974
+MD5 (squid2.5/squid-2.5.STABLE7-ftp_datachannel.patch) = cc65c481c7ea1e2cb2bc1c0b61f09a69
+SIZE (squid2.5/squid-2.5.STABLE7-ftp_datachannel.patch) = 4825
+MD5 (squid2.5/squid-2.5.STABLE7-short_icons_urls.patch) = 3cbed4fe923641bff5f23e69c444d63e
+SIZE (squid2.5/squid-2.5.STABLE7-short_icons_urls.patch) = 704
+MD5 (squid2.5/squid-2.5.STABLE7-response_splitting.patch) = ff3d8ae3e933817c91e745beba76b5fc
+SIZE (squid2.5/squid-2.5.STABLE7-response_splitting.patch) = 9782
Index: Makefile
===================================================================
--- Makefile (.../www/squid) (revision 340)
+++ Makefile (.../local/squid) (revision 340)
@@ -74,7 +74,7 @@
PORTNAME= squid
PORTVERSION= 2.5.7
-PORTREVISION= 7
+PORTREVISION= 8
CATEGORIES= www
MASTER_SITES= \
ftp://ftp.squid-cache.org/pub/%SUBDIR%/ \
@@ -102,7 +102,10 @@
squid-2.5.STABLE7-wccp_denial_of_service.patch \
squid-2.5.STABLE7-dns_memleak.patch \
squid-2.5.STABLE7-fqdn_truncated.patch \
- squid-2.5.STABLE7-ldap_spaces.patch
+ squid-2.5.STABLE7-ldap_spaces.patch \
+ squid-2.5.STABLE7-ftp_datachannel.patch \
+ squid-2.5.STABLE7-short_icons_urls.patch \
+ squid-2.5.STABLE7-response_splitting.patch
PATCH_DIST_STRIP= -p1
MAINTAINER= tmseck at netcologne.de
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list