Gentoo Archives: gentoo-announce

From: Kurt Lieber <klieber@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 200403-11 ] Squid ACL [url_regex] bypass vulnerability
Date: Wed, 31 Mar 2004 08:50:55
Message-Id: 20040331084904.GQ24315@mail.lieber.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200403-11
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Squid ACL [url_regex] bypass vulnerability
9 Date: March 30, 2004
10 Bugs: #45273
11 ID: 200403-11
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Squid versions 2.0 through to 2.5.STABLE4 could allow a remote attacker
19 to bypass Access Control Lists by sending a specially-crafted URL
20 request containing '%00': in such circumstances; the url_regex ACL may
21 not properly detect the malicious URL, allowing the attacker to
22 effectively bypass the ACL.
23
24 Background
25 ==========
26
27 Squid is a fully-featured Web Proxy Cache designed to run on Unix
28 systems that supports proxying and caching of HTTP, FTP, and other
29 URLs, as well as SSL support, cache hierarchies, transparent caching,
30 access control lists and many other features.
31
32 Affected packages
33 =================
34
35 -------------------------------------------------------------------
36 Package / Vulnerable / Unaffected
37 -------------------------------------------------------------------
38 net-www/squid < 2.5.5 >= 2.5.5
39
40 Description
41 ===========
42
43 A bug in Squid allows users to bypass certain access controls by
44 passing a URL containing "%00" which exploits the Squid decoding
45 function. This may insert a NUL character into decoded URLs, which may
46 allow users to bypass url_regex access control lists that are enforced
47 upon them.
48
49 In such a scenario, Squid will insert a NUL character after the"%00"
50 and it will make a comparison between the URL to the end of the NUL
51 character rather than the contents after it: the comparison does not
52 result in a match, and the user's request is not denied.
53
54 Impact
55 ======
56
57 Restricted users may be able to bypass url_regex access control lists
58 that are enforced upon them which may cause unwanted network traffic as
59 well as a route for other possible exploits. Users of Squid 2.5STABLE4
60 and below who require the url_regex features are recommended to upgrade
61 to 2.5STABLE5 to maintain the security of their infrastructure.
62
63 Workaround
64 ==========
65
66 A workaround is not currently known for this issue. All users are
67 advised to upgrade to the latest version of Squid.
68
69 Resolution
70 ==========
71
72 Squid can be updated as follows:
73
74 # emerge sync
75
76 # emerge -pv ">=net-www/squid-2.5.5"
77 # emerge ">=net-www/squid-2.5.5"
78
79 References
80 ==========
81
82 [ 1 ] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0189
83 [ 2 ] http://www.squid-cache.org/Advisories/SQUID-2004_1.txt
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.