1 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
2 |
Gentoo Linux Security Advisory GLSA 200403-11 |
3 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
4 |
http://security.gentoo.org |
5 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
6 |
|
7 |
Severity: Normal |
8 |
Title: Squid ACL [url_regex] bypass vulnerability |
9 |
Date: March 30, 2004 |
10 |
Bugs: #45273 |
11 |
ID: 200403-11 |
12 |
|
13 |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
14 |
|
15 |
Synopsis |
16 |
======== |
17 |
|
18 |
Squid versions 2.0 through to 2.5.STABLE4 could allow a remote attacker |
19 |
to bypass Access Control Lists by sending a specially-crafted URL |
20 |
request containing '%00': in such circumstances; the url_regex ACL may |
21 |
not properly detect the malicious URL, allowing the attacker to |
22 |
effectively bypass the ACL. |
23 |
|
24 |
Background |
25 |
========== |
26 |
|
27 |
Squid is a fully-featured Web Proxy Cache designed to run on Unix |
28 |
systems that supports proxying and caching of HTTP, FTP, and other |
29 |
URLs, as well as SSL support, cache hierarchies, transparent caching, |
30 |
access control lists and many other features. |
31 |
|
32 |
Affected packages |
33 |
================= |
34 |
|
35 |
------------------------------------------------------------------- |
36 |
Package / Vulnerable / Unaffected |
37 |
------------------------------------------------------------------- |
38 |
net-www/squid < 2.5.5 >= 2.5.5 |
39 |
|
40 |
Description |
41 |
=========== |
42 |
|
43 |
A bug in Squid allows users to bypass certain access controls by |
44 |
passing a URL containing "%00" which exploits the Squid decoding |
45 |
function. This may insert a NUL character into decoded URLs, which may |
46 |
allow users to bypass url_regex access control lists that are enforced |
47 |
upon them. |
48 |
|
49 |
In such a scenario, Squid will insert a NUL character after the"%00" |
50 |
and it will make a comparison between the URL to the end of the NUL |
51 |
character rather than the contents after it: the comparison does not |
52 |
result in a match, and the user's request is not denied. |
53 |
|
54 |
Impact |
55 |
====== |
56 |
|
57 |
Restricted users may be able to bypass url_regex access control lists |
58 |
that are enforced upon them which may cause unwanted network traffic as |
59 |
well as a route for other possible exploits. Users of Squid 2.5STABLE4 |
60 |
and below who require the url_regex features are recommended to upgrade |
61 |
to 2.5STABLE5 to maintain the security of their infrastructure. |
62 |
|
63 |
Workaround |
64 |
========== |
65 |
|
66 |
A workaround is not currently known for this issue. All users are |
67 |
advised to upgrade to the latest version of Squid. |
68 |
|
69 |
Resolution |
70 |
========== |
71 |
|
72 |
Squid can be updated as follows: |
73 |
|
74 |
# emerge sync |
75 |
|
76 |
# emerge -pv ">=net-www/squid-2.5.5" |
77 |
# emerge ">=net-www/squid-2.5.5" |
78 |
|
79 |
References |
80 |
========== |
81 |
|
82 |
[ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189 |
83 |
[ 2 ] http://www.squid-cache.org/Advisories/SQUID-2004_1.txt |
84 |
|
85 |
Concerns? |
86 |
========= |
87 |
|
88 |
Security is a primary focus of Gentoo Linux and ensuring the |
89 |
confidentiality and security of our users machines is of utmost |
90 |
importance to us. Any security concerns should be addressed to |
91 |
security@g.o or alternatively, you may file a bug at |
92 |
http://bugs.gentoo.org. |