---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated squid package fixes security vulnerability
Advisory ID:       RHSA-2004:462-01
Issue date:        2004-09-30
Updated on:        2004-09-30
Product:           Red Hat Enterprise Linux
CVE Names:         CAN-2004-0832
---------------------------------------------------------------------

1. Summary:

An updated squid package that fixes a security vulnerability in the NTLM
authentication helper is now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Squid is a full-featured Web proxy cache.

An out of bounds memory read bug was found within the NTLM authentication
helper routine.  If Squid is configured to use the NTLM authentication
helper, a remote attacker could send a carefully crafted NTLM
authentication packet and cause Squid to crash.  The Common Vulnerabilities
and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0832
to this issue.

Note: The NTLM authentication helper is not enabled by default in Red Hat
Enterprise Linux 3.  Red Hat Enterprise Linux 2.1 is not vulnerable to this
issue as it shipped with a version of Squid which did not contain the
vulnerable helper.

Users of Squid should update to this erratum package, which contains a
backported patch and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

131750 - CAN-2004-0832 Certain malformed NTLMSSP packets could crash the NTLM helpers provided by Squid

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS: 

319a574d8ab2d7e1bfa454055f3f1933  squid-2.5.STABLE3-6.3E.1.src.rpm

i386:
3b46288783aacdd9842d43f221201c44  squid-2.5.STABLE3-6.3E.1.i386.rpm

ia64:
e92e66c250e34497a397c53c33ae1c2b  squid-2.5.STABLE3-6.3E.1.ia64.rpm

ppc:
726578556b36bb263526841add7dd9a2  squid-2.5.STABLE3-6.3E.1.ppc.rpm

s390:
ce1c585636cfe7843f9188f283533800  squid-2.5.STABLE3-6.3E.1.s390.rpm

s390x:
cd974ecba26d90d98a145e9813221dfb  squid-2.5.STABLE3-6.3E.1.s390x.rpm

x86_64:
0c63d4747a0e6848cd69259b6e7648dd  squid-2.5.STABLE3-6.3E.1.x86_64.rpm

Red Hat Desktop version 3:

SRPMS: 

319a574d8ab2d7e1bfa454055f3f1933  squid-2.5.STABLE3-6.3E.1.src.rpm

i386:
3b46288783aacdd9842d43f221201c44  squid-2.5.STABLE3-6.3E.1.i386.rpm

x86_64:
0c63d4747a0e6848cd69259b6e7648dd  squid-2.5.STABLE3-6.3E.1.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: 

319a574d8ab2d7e1bfa454055f3f1933  squid-2.5.STABLE3-6.3E.1.src.rpm

i386:
3b46288783aacdd9842d43f221201c44  squid-2.5.STABLE3-6.3E.1.i386.rpm

ia64:
e92e66c250e34497a397c53c33ae1c2b  squid-2.5.STABLE3-6.3E.1.ia64.rpm

x86_64:
0c63d4747a0e6848cd69259b6e7648dd  squid-2.5.STABLE3-6.3E.1.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: 

319a574d8ab2d7e1bfa454055f3f1933  squid-2.5.STABLE3-6.3E.1.src.rpm

i386:
3b46288783aacdd9842d43f221201c44  squid-2.5.STABLE3-6.3E.1.i386.rpm

ia64:
e92e66c250e34497a397c53c33ae1c2b  squid-2.5.STABLE3-6.3E.1.ia64.rpm

x86_64:
0c63d4747a0e6848cd69259b6e7648dd  squid-2.5.STABLE3-6.3E.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
 

7. References:
 
  
CVE -CVE-2004-0832

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: squid security vulnerability

An updated squid package that fixes a security vulnerability in the NTLM authentication helper is now available.

Summary



Summary

Squid is a full-featured Web proxy cache.An out of bounds memory read bug was found within the NTLM authenticationhelper routine. If Squid is configured to use the NTLM authenticationhelper, a remote attacker could send a carefully crafted NTLMauthentication packet and cause Squid to crash. The Common Vulnerabilitiesand Exposures project (cve.mitre.org) has assigned the name CAN-2004-0832to this issue.Note: The NTLM authentication helper is not enabled by default in Red HatEnterprise Linux 3. Red Hat Enterprise Linux 2.1 is not vulnerable to thisissue as it shipped with a version of Squid which did not contain thevulnerable helper.Users of Squid should update to this erratum package, which contains abackported patch and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
131750 - CAN-2004-0832 Certain malformed NTLMSSP packets could crash the NTLM helpers provided by Squid
6. RPMs required:
Red Hat Enterprise Linux AS version 3:
SRPMS:
319a574d8ab2d7e1bfa454055f3f1933 squid-2.5.STABLE3-6.3E.1.src.rpm
i386: 3b46288783aacdd9842d43f221201c44 squid-2.5.STABLE3-6.3E.1.i386.rpm
ia64: e92e66c250e34497a397c53c33ae1c2b squid-2.5.STABLE3-6.3E.1.ia64.rpm
ppc: 726578556b36bb263526841add7dd9a2 squid-2.5.STABLE3-6.3E.1.ppc.rpm
s390: ce1c585636cfe7843f9188f283533800 squid-2.5.STABLE3-6.3E.1.s390.rpm
s390x: cd974ecba26d90d98a145e9813221dfb squid-2.5.STABLE3-6.3E.1.s390x.rpm
x86_64: 0c63d4747a0e6848cd69259b6e7648dd squid-2.5.STABLE3-6.3E.1.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
319a574d8ab2d7e1bfa454055f3f1933 squid-2.5.STABLE3-6.3E.1.src.rpm
i386: 3b46288783aacdd9842d43f221201c44 squid-2.5.STABLE3-6.3E.1.i386.rpm
x86_64: 0c63d4747a0e6848cd69259b6e7648dd squid-2.5.STABLE3-6.3E.1.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
319a574d8ab2d7e1bfa454055f3f1933 squid-2.5.STABLE3-6.3E.1.src.rpm
i386: 3b46288783aacdd9842d43f221201c44 squid-2.5.STABLE3-6.3E.1.i386.rpm
ia64: e92e66c250e34497a397c53c33ae1c2b squid-2.5.STABLE3-6.3E.1.ia64.rpm
x86_64: 0c63d4747a0e6848cd69259b6e7648dd squid-2.5.STABLE3-6.3E.1.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
319a574d8ab2d7e1bfa454055f3f1933 squid-2.5.STABLE3-6.3E.1.src.rpm
i386: 3b46288783aacdd9842d43f221201c44 squid-2.5.STABLE3-6.3E.1.i386.rpm
ia64: e92e66c250e34497a397c53c33ae1c2b squid-2.5.STABLE3-6.3E.1.ia64.rpm
x86_64: 0c63d4747a0e6848cd69259b6e7648dd squid-2.5.STABLE3-6.3E.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

References

Package List


Severity
Advisory ID: RHSA-2004:462-01
Issued Date: : 2004-09-30
Updated on: 2004-09-30
Product: Red Hat Enterprise Linux
CVE Names: CAN-2004-0832

Topic

An updated squid package that fixes a security vulnerability in the NTLMauthentication helper is now available.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Desktop version 3 - i386, x86_64

Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64


Bugs Fixed


Related News