Package name
squid
Date
2004-06-09
Advisory ID
MDKSA-2004:059
Affected versions
9.2 amd64 , 10.0 amd64 , 10.0 i586 , 9.2 i586 , 9.1 i586 , 9.1 i586

Problem description

A vulnerability exists in squid's NTLM authentication helper. This buffer overflow can be exploited by a remote attacker by sending an overly long password, thus overflowing the buffer and granting the ability to execute arbitrary code. This can only be exploited, however, if NTLM authentication is used. NTLM authentication is built by default in Mandrakelinux packages, but is not enabled in the default configuration. The vulnerability exists in 2.5.*-STABLE and 3.*-PRE. The provided packages are patched to fix this problem.

Updated packages

9.2 amd64

 d6d947d2874ab937f9fe8da3483526cd  amd64/9.2/RPMS/squid-2.5.STABLE3-3.2.92mdk.amd64.rpm
a5475f2c166ec6356665ac6bc3cc42f6  amd64/9.2/SRPMS/squid-2.5.STABLE3-3.2.92mdk.src.rpm

10.0 amd64

 9ca1045d76480a6cefa88c976ffad762  amd64/10.0/RPMS/squid-2.5.STABLE4-1.2.100mdk.amd64.rpm
ee7855a3e9b91bd841456f05345c03bf  amd64/10.0/SRPMS/squid-2.5.STABLE4-1.2.100mdk.src.rpm

10.0 i586

 357b863653182b983e65cee68b3b36a3  10.0/RPMS/squid-2.5.STABLE4-1.2.100mdk.i586.rpm
ee7855a3e9b91bd841456f05345c03bf  10.0/SRPMS/squid-2.5.STABLE4-1.2.100mdk.src.rpm

9.2 i586

 69c605f5733ea04b8e13448ea485300c  9.2/RPMS/squid-2.5.STABLE3-3.2.92mdk.i586.rpm
a5475f2c166ec6356665ac6bc3cc42f6  9.2/SRPMS/squid-2.5.STABLE3-3.2.92mdk.src.rpm

9.1 i586

 4cc291bba5832c61862670c28d703991  9.1/RPMS/squid-2.5.STABLE1-7.2.91mdk.i586.rpm
8990299a7b722425b56f90f57bb9c415  9.1/SRPMS/squid-2.5.STABLE1-7.2.91mdk.src.rpm

9.1 i586

 b0885966e6ebecd69b16a960fd70cb97  ppc/9.1/RPMS/squid-2.5.STABLE1-7.2.91mdk.ppc.rpm
8990299a7b722425b56f90f57bb9c415  ppc/9.1/SRPMS/squid-2.5.STABLE1-7.2.91mdk.src.rpm

References